In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam UTM’s Layer 8 technology has been derived out of the need for a more robust network security system which can include a user's human identity as part of the firewall rule matching criteria.

By definition, Cyberoam UTM’s Layer 8 Technology treats user identity the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.


• Identification of attackers/victims with username
• Instant visibility for administrators into source of attacks
• Controlling who is doing what in the network
• Allowing creation of identity-based policies
• Reporting to track identity-based usage, problems, intrusions and so forth.

Looking for Data Center Hosting in India? Visit ESDS website at WWW.ESDS.CO.IN for Rich Data Center Web Hosting and Software Services at Affordable Costs.