Title: Top 5 Features of Application Visibilty and Control
1Application Visibility and Control Top 5
Features Benefits
2Application Visibility and Control??
- Application visibility and control offers total
visibility and contol over, which application by
which user is being accesed within the
organization, irrespective of their ports and
protocols. - It is the best way to avoid application-layer
threats, including malware, phishing, botnets
etc. - Cyberoam with layer 7 and layer 8 identity-based
policies and reporting offers application
visibility and control over 2000 key
applications.
3Top 5 Features of Cyberoam's Application
Visibility and Control
- 1) Application Security
- 2) Granular Controls
- 3) User and Time-based Controls for Application
Access - 4) Layer 8 Identity and QoS-based Application
Control - 5) QoS for Applications
-
- QoS Quality of Service
41) Application Security
- Features
- It restricts and blocks anonymous proxies
- Prevents phone home activities and keyloggers
- Layer 7 and Layer 8 visibility
- Database available with inbuilt application
category
-
- Benefits
- Prevents sophisticated application-based threats
including malware, phishing, botnets
52) Granular Controls
- Features
- Pro-active protection model
- Applications are categorized based on their level
of risk, characteristics and technology
- Benefits
- Policies can be set or edited easily for
application access with just few clicks - No manual updates needed for new application in
network
63) User and Time-based Controls for Application
Access
- Features
- Controls usage of social applications and
networking sites, such as Facebook, YouTube etc. - Controls P2P (peer-to-peer) applications, such
as Skype - Bifurcates creation of White (Business-critical),
Grey (social, entertainment) and Black
(non-productive) application categories based on
priority - Schedules non-critical applications during
non-peak hours.
73) User and Time-based Controls for Application
Access
-
- Benefits
- Controlled bandwidth usage
- Enhanced productivity through flexibility
- Supports business-critical applications
- Ensures application security
84) Layer 8 Identity and QoS-based Application
Control
- Features
- Controls usage of application depending upon
user, user group, bandwidth, sources and
destination.
- Benefits
- Enhanced productivity
- Optimizes usage of bandwidth
- Supports user-critical applications, such as VoIP
95) QoS for Applications
- Features
- Limits bandwidth allocation to non-business
applications - Priority-based bandwidth allocation to critical
applications
- Benefits
- Optimized bandwidth utilization
- Enables application QoS
- QoS Quality of Service
10Our Social Reach
11Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
USA Central 1-732-412-4896Delhi NCR
91-9899150300 Ahmedabad 91-9925011328 Bangalo
re 91-9880345671 Dubai
971-4-214 9860
North America 505 Thornall Street, Suite
304 Edison, NJ -08837 USA
Cyberoam House, Saigulshan Complex, Opp.
Sanskruti, Beside White House, Panchwati Cross
Road, Ahmedabad - 380006, GUJARAT, INDIA.
sales_at_cyberoam.com