Securing You
Cyberoam banner NU banner
CALL US:  0800 085 6661
IPv6 Ready
IPv6 Ready

UTM Level 5 Checkmark Certification

ICSA Certified
ICSA Labs Certified Firewall

Network Products Guide - Best Products and Services 2008 2007 Global Excellence Awards
Winning the Battle for Bandwidth




Cyberoam Endpoint Data Protection delivers enhanced security to organizations with policy-driven data protection and asset management over the endpoint. With a full set of modules including data protection and encryption, device management, application control and asset management, it prevents data loss and supports organization-wide efforts towards security, employee productivity and efficiency in management of IT assets.

System Architecture

Available in downloadable form, Cyberoam Endpoint Data Protection functions through three components: Agent, Server and Console. Agent installation on the client machines is a simple, centralized task that is done in silent mode with no disruption of end user function. The agent plays the role of endpoint policy implementation while sending logs of activity to the server.

Endpoint Data Protection - Deployment Diagram

The Cyberoam Endpoint Data Protection consists of 3 components:

  • Server - Database storage and agent management
  • Console - Audits, controls and monitors the computers
  • Agent - Collects and forwards the data to the server

Organizations are advised to plan their server capacity based on the log storage, file back-up and archival policy. Those with stringent shadow copy and back-up policies of files during modification, deletion or printing and long time frames of archival would require higher server capacity.

Multiple administrator consoles promote role-based administration with decentralized view and management of user activity. This requires administrator client installation. Each individual administrator, say a departmental head can be given role-based administration privilege with the rights to add, modify, delete and view user activities in their console as per their departmental or group requirements.

Hardware Requirements

Agent Module Console Module Server Module
Pentium III 500 MHz Pentium III 1 GHz Pentium IV 2 GHz
128 MB Memory 256 MB Memory 512 MB Memory
OS: Win 2000/XP/2003/2008/Vista (32 bit edition only) OS: Win 2000/2003/XP/2008/Vista (32 bit edition only) OS: Win 2000 SP4/XP SP2 Win 2003 SP1/2008
Database: None Database: None Database: SQL Server 2000 SP4/ 2005 SP1 / MSDE/2005 Express



Data Protection and Encryption
  Cyberoam’s Data Protection and Encryption allows administrators to create user identity or group-based data protection policies for removable devices such as USB devices and CD/DVDs, as well as for network sharing, Instant Messengers, emails and printing. Encryption of the entire removable device or file encryption at the time of transfer offers strict or flexible control. Administrators can control file transfer with the file name or extension in addition to taking shadow copies of transferred, modified or deleted files.
Device Management
  Cyberoam Device Management allows or blocks removable devices like USB drives, storage devices, CD/DVDs, MP3 players, digital cameras, serial ports, parallel ports, modems, bluetooth, wireless card, and more based on individual users or groups. It allows policies based on time of the day, when outside the network in addition to defining expiring time for the temporary policies.
Application Control
  Cyberoam’s Application Control offers granular policy-based controls, allowing or blocking access to pre-defined and customizable lists of applications, including web, instant messengers, P2P, gaming and more. Organizations can thus, protect sensitive data, control malware entry while enhancing employee productivity.
Asset Management
  Cyberoam’s Asset Management module for Windows offers automated tracking of hardware and software asset location, configuration, version tracking, and historical information, allowing streamlined IT infrastructure management. Further, it offers patch management and updations of operating system and deployment of application software and security solutions.

For price quote or further product details, please contact us