Technology

Cyberoam introduces ‘User Threat Quotient’ to spot security risks

Views: 481

Abhilash Sonwane_SVP, Products and Technology, CyberoamCyberoam, a leading global provider of network security appliances has introduced a unique capability – User Threat Quotient (UTQ) – to help IT security managers identify users posing security risks with ease.

 With UTQ, Cyberoam extends its own innovation of Layer-8 technology and turns over a new leaf in user-identity focused security. Available on Cyberoam’s Next-Generation Firewall and UTM appliances, UTQ harnesses information derived out of user’s web traffic to determine risky users that pose security and /or legal risks.

 Abhilash Sonwane, SVP, Products and Technology, Cyberoam said, “Enterprise networks generate lots of data with ample clues into user-triggered event. However, the information remains incomprehensible and correlating data from various logs and reports takes time and special skills.”

 “Most security teams struggle with timely detection of risk-prone user behaviour since they remain devoid of required actionable security data. User Threat Quotient (UTQ) from Cyberoam effortlessly profiles suspicious web behavior of network users, helping security teams with actionable inputs and relieving them from having to go through a labyrinth of massive logs, ” added Sonwane.

 The User Threat Quotient (UTQ) studies the web behavior of users by analysing massive data of allowed and denied web traffic for web categories like IP Address, P2P, Phishing and Fraud, Porn, Spam URL, Spyware, URL Translation Sites and more that pose security and legal risks.

 The User Threat Quotient helps CSOs / IT security managers by:

  1. Spotting risky users based on their web behavior at a glance without manual efforts
  2. Removing complexity in analyzing terabytes of logs to identify suspicious or risk-prone user behavior
  3. Eliminating the need for SMBs to invest in separate SIEM tools to spot risky users
  4. Enabling investigation into the spread of risk within the network
  5. Facilitating corrective actions to fine-tune user policies

Comments

comments

Click to comment

Leave a Reply

Your email address will not be published.

Latest News

To Top