Cyberoam Endpoint Data Protection Suite
May 03, 2010
$75 per license
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Easy to use with a lot of features.
- Weaknesses: None that we found.
- Verdict: For its ease of use and strong feature set, we make this one our Recommended product this month.
The Endpoint Data Protection Suite from Cyberoam is a full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management. The data encryption and protection module allows for control over document transfer and read-write access to files, as well as shadow copy protection and print controls. The device management module controls access to removable media, such as USB storage devices, as well as many other types of removable storage. The application control module controls use of applications, such as instant messaging, peer-to-peer and FTP utilities. The final piece of the suite allows for asset management and inventory control across the enterprise network.
We found this product to be a simple install and easy to manage. The installation process consists of running an executable installer on the server and providing the SQL server information for the backend database. After the installation is complete, agents can be easily deployed using the included agent deployment tool. Once the installation is complete and the agents installed, all policy configuration and deployment is done through a management console application. We found this console to be easy to use and intuitive to navigate.
Setting up policy was also quite easy. The policy engine allows for very granular or very broad policy by creating various computer and user groups. The groups can be pulled directly from Active Directory so they can either be the same as they are in Active Directory or modified specifically for the use of the product.
Documentation included two PDFs. The first was an installation guide, which provided detailed initial setup and configuration steps and instructions, including database prerequisites. The second was the administrators guide, which included instructions for how to configure policies and advance program features. Both guides included many screen shots and step-by-step configuration examples.
Cyberoam includes the first year of basic support in the purchase of the product. This support includes 24/7 phone and email technical support, as well as access to the web-based support area, which includes a knowledge base and FAQ section. After the first year, users must renew a support subscription to continue using the phone and email support.
At a price of $75 per license, this product may seem expensive, but we find it to be a good value for the money based on its comprehensive feature set and easy-to-use policy engine.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure