Cyberoam Endpoint Data Protection delivers enhanced security to organizations with policy-driven data protection and asset management over the endpoint. Cyberoam Endpoint Data Protection scans the network, and discovers the host by sending ICMP request. Article appears in the following topics. After the license is expired in Cyberoam Endpoint Data Protection, all the policies would still be applicable for the client agent which were last.

Author: Vorn Faunris
Country: Morocco
Language: English (Spanish)
Genre: Spiritual
Published (Last): 5 December 2009
Pages: 126
PDF File Size: 15.39 Mb
ePub File Size: 6.92 Mb
ISBN: 487-9-83923-501-2
Downloads: 9049
Price: Free* [*Free Regsitration Required]
Uploader: Tygogul

Results 1—9 of 9 1. Those with stringent shadow copy and back-up policies of files during modification, deletion or printing and long time frames of archival would require higher server capacity. Control over all USB devices I can think of, it can be customized to control all the applications that are used, encryption and easy controls to departmental heads.

Reviews Current version All versions. Company Information about us contact news directions privacy. Complete data protection even can track live chats.


None that I can think of. Winning the Battle for Bandwidth. Organizations can thus, protect sensitive data, control malware entry while enhancing employee productivity. Note that your submission may not appear immediately on our site. Mon, 31 December The agent plays the role of endpoint policy implementation while sending logs of ejdpoint to the server.


Enter the e-mail address of the recipient Add your own personal message: Cyberoam Endpoint Data Protection delivers policy-driven data protection and asset management in a single solution. Tracking of web based emails which is very difficult.

Was this review helpful? Cons Till now, nothing. Would be good if its ease of use eendpoint extended to data protection beyond the endpoint.

How does Cyberoam Endpoint Data Protection discover the host? – Sophos Community

Requires very low hardware and works really hard on your “End Points”. Encryption of the entire removable device or file encryption at the time of transfer offers strict or eendpoint control.

Since you’ve already submitted a review for this product, this submission will be added as an update to your original review. Please contact the developer for pricing information.

Overview User Reviews Specs.

Multiple administrator consoles promote role-based administration with decentralized view and management of user activity.

You are logged in as.


Cyberoam : Cyberoam Endpoint Data Protection : from Networks Unlimited

Promote cracked software, or other illegal content. Brings critical USB and protfction control. Once reported, our staff will be notified and the comment will be reviewed.

Choose your product here and we’ll send you a detailed Quote to your email address by return. Login or create an account to post a review. I use a Cyberoam unified threat management customer for my gateway security requirements. Perfect Solution, Perfect Delivery! Easy installation Remote silent client installer 2.

Flaming or offending other users. Cyberoam Endpoint Protection covers the protectjon spectrum. Cyberoam Endpoint Data Protection delivers enhanced security to organizations with policy-driven data protection and asset management over the endpoint.