11
Application Visibility and Control Top 5 Features & Benefits

Top 5 Features of Application Visibilty and Control

Embed Size (px)

DESCRIPTION

Cyberoam offers total application visibility and control with layer 7 policies and reporting that prevents data leakage. It also provides a sophisticated application layer against threats like malware and phishing botnets.

Citation preview

Application Visibility and Control Top 5 Features & Benefits

Application Visibility and Control??

Application visibility and control offers total visibility and contol over, which application by which user is being accesed within the organization, irrespective of their ports and protocols.

It is the best way to avoid application-layer threats, including malware, phishing, botnets etc.

Cyberoam with layer 7 and layer 8 identity-based policies and reporting offers application visibility and control over 2000+ key applications.

Top 5 Features of Cyberoam's Application Visibility and Control

1) Application Security

2) Granular Controls

3) User and Time-based Controls for Application Access

4) Layer 8 Identity and QoS-based Application Control

5) QoS for Applications

*QoS= Quality of Service

1) Application Security

Features It restricts and blocks anonymous proxies Prevents “phone home” activities and keyloggers Layer 7 and Layer 8 visibility Database available with inbuilt application category Benefits: Prevents sophisticated application-based threats including malware,

phishing, botnets

2) Granular Controls

Features: Pro-active protection model Applications are categorized based on their level of risk, characteristics and

technology

Benefits: Policies can be set or edited easily for application access with just few

clicks No manual updates needed for new application in network

3) User and Time-based Controls for Application Access

Features: Controls usage of social applications and networking sites, such as:

Facebook, YouTube etc. Controls P2P (peer-to-peer) applications, such as: Skype Bifurcates creation of White (Business-critical), Grey (social, entertainment)

and Black (non-productive) application categories based on priority Schedules non-critical applications during non-peak hours.

3) User and Time-based Controls for Application Access

Benefits: Controlled bandwidth usage Enhanced productivity through flexibility Supports business-critical applications Ensures application security

4) Layer 8 Identity and QoS-based Application Control

Features: Controls usage of application depending upon user, user group,

bandwidth, sources and destination.

Benefits: Enhanced productivity Optimizes usage of bandwidth Supports user-critical applications, such as VoIP

5) QoS for Applications

Features: Limits bandwidth allocation to non-business applications Priority-based bandwidth allocation to critical applications

Benefits: Optimized bandwidth utilization Enables application QoS

*QoS= Quality of Service

Our Social Reach

Cyberoam Technologies

USA Central : +1-732-412-4896Delhi & NCR : +91-9899150300Ahmedabad : +91-9925011328Bangalore: +91-9880345671 Dubai: +971-4-214 9860

Cyberoam House,Saigulshan Complex,

Opp. Sanskruti,Beside White House,

Panchwati Cross Road,Ahmedabad - 380006,

GUJARAT, INDIA.

Cyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam Technologies

North America505 Thornall

Street, Suite # 304Edison, NJ -08837

USA

[email protected]