Call a Specialist Today! 800-886-5369

Cyberoam On-Appliance Reporting
Layer 8 Identity-based visibility into user and network activity


Real-time visibility into network activities

Cyberoam’s on-appliance reporting delivers Layer 8 Identity-based visibility into user and network activity, offering real-time information regarding who is doing what across central and remote locations.

Cyberoam UTM appliances deliver in-depth reporting over the appliance, eliminating the need for an independent reporting solution and minimizing the resultant security investment and operational expense.

Feature Feature Description Benefit
Human Layer 8 Identity-based Security
  • User identity-based reports in dynamic Wi-Fi and shared endpoint environments in healthcare, educational institutions, retail stores and call centers
  • Visibility into who is doing what
  • Visibility into who is accessing which application
  • Instant identification of the source or destination endpoint under attack or perpetuating an attack
  • Helps prevent data leakage
  • Supports regulatory compliance requirements of CIPA, HIPAA, PCI DSS, GLBA
  • Shorter audit cycles
Security Reporting
  • Firewall & Internet activity
  • VPN activity
  • Intrusion Prevention reports
  • Spam reports
  • Virus reports
  • Web activity
  • Search Engine Query reports
  • Mail activity
  • IM activity
  • FTP activity
  • Real-time view of network activity
  • Supports instant security action
Compliance Reporting
  • HIPAA
  • GLBA
  • SOX
  • PCI DSS
  • FISMA
  • Supports compliance to regulatory requirements
Personalized View
  • Create custom dashboard
  • Bookmark important reports
  • View custom trends
  • Create custom reports
  • High flexibility to meet organizational requirements
Report Formats
  • View Formats – Tabular, Graphical
  • Print Formats – CSV, PDF
  • High flexibility to meet organizational requirements
  • Report sharing with the relevant departments and management
On-Appliance Reporting
  • Free reporting module over Cyberoam UTM appliances
  • Eliminates need for separate reporting solution
  • Minimizes security investment and operational expense involved in maintenance