Top 5 Features of Application Visibilty and Control

Page 1

Application Visibility and Control Top 5 Features & Benefits


Application Visibility and Control??

ď Ź

ď Ź

ď Ź

Application visibility and control offers total visibility and contol over, which application by which user is being accesed within the organization, irrespective of their ports and protocols. It is the best way to avoid application-layer threats, including malware, phishing, botnets etc. Cyberoam with layer 7 and layer 8 identity-based policies and reporting offers application visibility and control over 2000+ key applications.


Top 5 Features of Cyberoam's Application Visibility and Control 1) Application Security 2) Granular Controls 3) User and Time-based Controls for Application Access 4) Layer 8 Identity and QoS-based Application Control 5) QoS for Applications *QoS= Quality of Service


1) Application Security Features 

It restricts and blocks anonymous proxies

Prevents “phone home” activities and keyloggers

Layer 7 and Layer 8 visibility

Database available with inbuilt application category

Benefits: 

Prevents sophisticated application-based threats including malware, phishing, botnets


2) Granular Controls Features: 

Pro-active protection model Applications are categorized based on their level of risk, characteristics and technology

Benefits: 

Policies can be set or edited easily for application access with just few clicks No manual updates needed for new application in network


3) User and Time-based Controls for Application Access Features: 

Controls usage of social applications and networking sites, such as: Facebook, YouTube etc. Controls P2P (peer-to-peer) applications, such as: Skype Bifurcates creation of White (Business-critical), Grey (social, entertainment) and Black (non-productive) application categories based on priority Schedules non-critical applications during non-peak hours.


3) User and Time-based Controls for Application Access

Benefits: 

Controlled bandwidth usage

Enhanced productivity through flexibility

Supports business-critical applications

Ensures application security


4) Layer 8 Identity and QoS-based Application Control Features: 

Controls usage of application depending upon user, user group, bandwidth, sources and destination.

Benefits: 

Enhanced productivity

Optimizes usage of bandwidth

Supports user-critical applications, such as VoIP


5) QoS for Applications Features: 

Limits bandwidth allocation to non-business applications

Priority-based bandwidth allocation to critical applications

Benefits: 

Optimized bandwidth utilization

Enables application QoS

*QoS= Quality of Service


Our Social Reach


Cyberoam Technologies USA Central : +1-732-412-4896 Delhi & NCR : +91-9899150300 Ahmedabad : +91-9925011328 Bangalore: +91-9880345671 Dubai: +971-4-214 9860 North America 505 Thornall Street, Suite # 304 Edison, NJ -08837 USA

Cyberoam House, Saigulshan Complex, Opp. Sanskruti, Beside White House, Panchwati Cross Road, Ahmedabad - 380006, GUJARAT, INDIA.

sales@cyberoam.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.