Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Open source logging and reporting from Cyberoam

Cyberoam : 23 September, 2009  (New Product)
iView is Cyberoam's open source identity-based logging and reporting system for security management and regulatory compliance
Cyberoam iView, an open source logging and reporting solution has been launched by Cyberoam, the vendor of Identity-based Unified Threat Management Solutions. iView is Cyberoam's contribution to the open source community and is an appreciation of the principles of sharing and openness that the community stands for.

Cyberoam iView delivers centralized Identity-based logging and reporting of multiple devices across geographical locations, enabling organizations to meet their security management and regulatory compliance requirements. In addition, organizations receive the benefit of flexibility and speed of development which the open source community brings to them, allowing them to gain visibility into the entire network activity without having to make large capital outlays.

Currently, organizations are forced to deploy expensive logging-reporting solutions or correlate individual logs from multiple devices like firewalls, anti-virus, anti-spam solutions, intrusion prevention solutions, proxy servers, routers, operating systems and more to meet the requirements of regulatory compliance and maintain high security levels. The market for this segment, popularly known as Security Information and Event Management (SIEM) is estimated to be 1.3 Billion USD, growing at over 25 % annually.

Says Abhilash Sonwane, Vice-President-Product Management, Cyberoam, "The internal user is the key factor in an organization's security which is why Cyberoam is the only solution that has always given visibility into "Who is doing What" in the network. With the rise in insider threats and the consequent rise in security breaches and regulatory compliance requirements, we saw a broader need for user-centric reporting beyond Cyberoam's own UTM security," he adds. "Hence, we decided to bring our experience in Identity-based Reporting to meet organizations' requirement for logging-reporting from multiple devices and applications with reduced complexity."

Cyberoam iView would, initially enable organizations to derive logs and reports of open source solutions like the Linux Iptables/netfilter Firewall, the popular open source HTTP proxy Squid and other commercial UTM firewall solutions also. With the involvement of the open source community, it aims to add more such popular and widely used network devices, servers, databases and operating systems rapidly. The solution offers archiving and meets the legal and investigative requirements of forensics.

The development community and organizations are free to download Cyberoam iView from sourceforge.net. Available as open source, the solution has a ready list of projects which would help organizations, particularly small and medium enterprises in bringing logging-reporting over multiple devices and locations over a single, consolidated, centralized interface, helping them meet the requirements of regulatory compliance.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo