Safe SOHO surfing

March 2012 Information Security

Being online is an extreme sport these days as hackers, malware and all sorts of unsavoury characters try to exploit (with success much of the time) unsuspecting users, even those not doing anything untoward on the Internet. For home and small businesses, the threat of all these dangers is all the more serious as the cost of effective protection is often too high for these environments.

Cyberoam has a solution to this problem in its NetGenie range of UTM (unified threat management) devices aimed at the home and small office. NetGenie is a small device, about the size of an ADSL router that sits between the people you want to give Internet access to and your ADSL router (or modem). It monitors all Internet traffic and automatically protects you via its firewall, antivirus and intrusion prevention system. In other words, it does enterprise-level protection for the small office or home, including offering VPN access.

As a bonus to those who use 3G services to access the Internet, you are able to plug a 3G modem into the NetGenie and have the same level of protection – although we had some trouble setting it up. The antivirus updates itself automatically, although we recommend you run a manual update when the system is first installed.

The NetGenie creates its own wireless network for others to log into, ensuring all Internet access is protected.

Of course, simply preventing malware is only one aspect of keeping yourself safe on the Net today. The NetGenie also offers an easy-to-use browser interface from which administrators can control the Websites and applications their users use. For example, if a company wants to limit access to social networks, the administrator can block access to these sites by choosing the list of social sites that comes with the system, or by choosing specific sites that the company wants banned.

This blocking can be done on a universal basis, preventing everyone from accessing social media (or sexually explicit, political or a host of other categories pre-programmed into the system), or on a per user basis. For example, you may allow your marketing manager to access YouTube, Twitter and Facebook, but nobody else.

Alternatively, the administrator can allow access to these sites only at specific times. If you do not want to set the surfing limits according to NetGenie’s categories, you can also manually enter specific sites that are blocked or have limited access.

The simplest setup will see the administrator simply choosing a level of protection, from a whitelist through to minimal restrictions at the click of a mouse.

With NetGenie in place, users will be presented with a login screen each time they open their browser. Their login name will automatically assign them rights and manage the process, which includes access to applications.

The system allows you to draw reports on usage, including measuring each user’s bandwidth consumption in a set period.

The default settings ensure your network is secure as soon as you plug it in, also asking the administrator to choose a new password.

For more information contact Lynton Lubbe, Cyberoam, South Africa, [email protected], www.cyberoam.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Kaspersky’s predictions for 2025 APT landscape
Information Security
The 2025 advanced persistent threat (APT) includes the rise of hacktivist alliances, increased use of AI-powered tools by state-affiliated actors – often with embedded backdoor – more supply chain attacks on open-source projects.

Read more...
SecurityHQ certified B-BBEE Level 1: Delivering global services from a local entity
SecurityHQ Information Security
SecurityHQ, a global managed security services provider (MSSP) with an office in South Africa, has announced it can now offer local companies a complete managed cybersecurity service from a Level-1 B-BBEE accredited and 51% black-owned service provider.

Read more...
2024, the year of Fraud-as-a-Service
Information Security
A report from AU10TIX outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.

Read more...
The future of endpoint security
Information Security
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. Endpoint security involves safeguarding devices connected to a network from a range of cyberthreats.

Read more...
Not enough businesses take cybercrime seriously
Information Security
Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...