Cyberoam Endpoint Data Protection Suite
May 03, 2010
$75 per license
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Easy to use with a lot of features.
- Weaknesses: None that we found.
- Verdict: For its ease of use and strong feature set, we make this one our Recommended product this month.
The Endpoint Data Protection Suite from Cyberoam is a full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management. The data encryption and protection module allows for control over document transfer and read-write access to files, as well as shadow copy protection and print controls. The device management module controls access to removable media, such as USB storage devices, as well as many other types of removable storage. The application control module controls use of applications, such as instant messaging, peer-to-peer and FTP utilities. The final piece of the suite allows for asset management and inventory control across the enterprise network.
We found this product to be a simple install and easy to manage. The installation process consists of running an executable installer on the server and providing the SQL server information for the backend database. After the installation is complete, agents can be easily deployed using the included agent deployment tool. Once the installation is complete and the agents installed, all policy configuration and deployment is done through a management console application. We found this console to be easy to use and intuitive to navigate.
Setting up policy was also quite easy. The policy engine allows for very granular or very broad policy by creating various computer and user groups. The groups can be pulled directly from Active Directory so they can either be the same as they are in Active Directory or modified specifically for the use of the product.
Documentation included two PDFs. The first was an installation guide, which provided detailed initial setup and configuration steps and instructions, including database prerequisites. The second was the administrators guide, which included instructions for how to configure policies and advance program features. Both guides included many screen shots and step-by-step configuration examples.
Cyberoam includes the first year of basic support in the purchase of the product. This support includes 24/7 phone and email technical support, as well as access to the web-based support area, which includes a knowledge base and FAQ section. After the first year, users must renew a support subscription to continue using the phone and email support.
At a price of $75 per license, this product may seem expensive, but we find it to be a good value for the money based on its comprehensive feature set and easy-to-use policy engine.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards