SecurityWorldMarket

13/07/2010

Identity based WLAN UTM appliance

Dubai, UAE

Bulwark Technologies LLC, value added distributor for IT Security Solutions and Cyberoam products announces the launch of CR15wi UTM appliance which brings the entire set of UTM security features over WLAN to protect home offices, remote offices and public Internet access outlets.
Currently, corporate Wi-Fi environments are at huge risk from information theft and cyber-terrorism attacks due to their inability to trace end users, especially the guest users. CR15wi overcomes this by a unique Layer 8 technology, treating user-identity as the 8th Layer or the “human” layer in the protocol stack. This allows administrators to apply identity-based security policies to gain visibility over user activity in the network.

“Organisations with dynamic IP environments lack the ability to trace end users, especially the guest users, which poses a huge risk of information theft.Guest users are usually authenticated using a common pre-shared key. This greatly increases the risk of network abuse by guest users over an extended period of time when they are outside the corporate network. But by using Cyberoam we can Time-bound Wi-Fi access controls for all users, including guests, reduce cost of managing WLAN by replacing separate routers and firewall and Cyberoam’s Layer 8 technology gives complete trace of guest user activity” says Mr. Avinash Chanchalani, Product Manager, Bulwark Technologies LLC

For secure authentication, CR15wi supports multiple virtual access points that create independent, segregated networks in the same physical area of the organisation (sales, marketing, guest users etc.). This prevents rogue clients from connecting to networks where they don’t belong.

The usage of MIMO technology improves throughput and range values, thus, enabling faster handling of video streaming and high bandwidth downloads. Cyberoam’s Layer 8 Technology and Application Layer 7 Management over WLAN also allows user-specific bandwidth allocation for non-critical, semi-critical and critical business applications.


Product Suppliers
Back to top