Traditional ways of looking at firewalls limit organizations' ability to meet the fight for bandwidth brought up by the movement of internal applications to the Cloud. Cyberoam, the identity-based UTM, comprehensively covers the 4 elements - Application, User, Time and Bandwidth - all of which can easily be handled through Layer 7 - Layer 8 visibility and controls to make bandwidth available for critical applications and stagger non-critical application usage. This delivers the required productivity by moving firewalls beyond their traditional security-focused approach.