CyberoamLogoNetwork Security appliances provider Cyberoam has been awarded a patent for identity and policy-based network security and management by the US Patent Office.

The layer-8 security method is in line with the firm’s extensive portfolio of next-generation firewall (NGFW) and unified threat management (UTM) network security appliances. The technology offers a unique capability to connect end user identity with network security policy, allowing IT security managers to more effectively manage activity and access based on individual needs.

According to Hemal Patel- CEO of Cyberoam Technologies in a statement to TechMoran, “This patent grant validates Cyberoam’s continued leadership in providing identity-based network security to address two of the primary security challenges: helping network administrators manage the weakest link in the security chain with user-defined security and network access policies, and strengthening compliance and reporting based on complete visibility of user activity in the network.”

Traditional firewall security measures are designed to scan network traffic based on source and destination IP criteria, to allow or deny request for Internet or network access. Cyberoam’s innovative system and method can apply rules and policies specific to the user, between the source and the destination. This ‘Layer 8’ Technology allows user-specific policies, enabling granular security controls for firewall decisions. Network administrators and IT security managers gain the ability to grant network, bandwidth and application access based on user-identity, time-of-day and other Layer-7 (application layer) controls.

With the additional level of control and visibility provided by Cyberoam Layer 8 Technology, organizations are better enabled to meet regulatory compliance requirements such as HIPAA, CIPA, PCI-DSS, GLBA, etc.

The patent describes a system and method that provide a security and management system between the source and the destination which is configured to apply rules and policies which are specific to the user to the connection between the source and the destination. The user-specific policies are used to govern the security and management of each packet transmitted and received via the connection.