Top 5 Features of Application Visibilty and Control - PowerPoint PPT Presentation

About This Presentation
Title:

Top 5 Features of Application Visibilty and Control

Description:

Cyberoam offers total application visibility and control with layer 7 policies and reporting that prevents data leakage. It also provides a sophisticated application layer against threats like malware and phishing botnets. – PowerPoint PPT presentation

Number of Views:70

less

Transcript and Presenter's Notes

Title: Top 5 Features of Application Visibilty and Control


1
Application Visibility and Control Top 5
Features Benefits
2
Application Visibility and Control??
  • Application visibility and control offers total
    visibility and contol over, which application by
    which user is being accesed within the
    organization, irrespective of their ports and
    protocols.
  • It is the best way to avoid application-layer
    threats, including malware, phishing, botnets
    etc.
  • Cyberoam with layer 7 and layer 8 identity-based
    policies and reporting offers application
    visibility and control over 2000 key
    applications.

3
Top 5 Features of Cyberoam's Application
Visibility and Control
  • 1) Application Security
  • 2) Granular Controls
  • 3) User and Time-based Controls for Application
    Access
  • 4) Layer 8 Identity and QoS-based Application
    Control
  • 5) QoS for Applications
  • QoS Quality of Service

4
1) Application Security
  • Features
  • It restricts and blocks anonymous proxies
  • Prevents phone home activities and keyloggers
  • Layer 7 and Layer 8 visibility
  • Database available with inbuilt application
    category
  • Benefits
  • Prevents sophisticated application-based threats
    including malware, phishing, botnets

5
2) Granular Controls
  • Features
  • Pro-active protection model
  • Applications are categorized based on their level
    of risk, characteristics and technology
  • Benefits
  • Policies can be set or edited easily for
    application access with just few clicks
  • No manual updates needed for new application in
    network

6
3) User and Time-based Controls for Application
Access
  • Features
  • Controls usage of social applications and
    networking sites, such as Facebook, YouTube etc.
  • Controls P2P (peer-to-peer) applications, such
    as Skype
  • Bifurcates creation of White (Business-critical),
    Grey (social, entertainment) and Black
    (non-productive) application categories based on
    priority
  • Schedules non-critical applications during
    non-peak hours.


7
3) User and Time-based Controls for Application
Access
  • Benefits
  • Controlled bandwidth usage
  • Enhanced productivity through flexibility
  • Supports business-critical applications
  • Ensures application security


8
4) Layer 8 Identity and QoS-based Application
Control
  • Features
  • Controls usage of application depending upon
    user, user group, bandwidth, sources and
    destination.
  • Benefits
  • Enhanced productivity
  • Optimizes usage of bandwidth
  • Supports user-critical applications, such as VoIP

9
5) QoS for Applications
  • Features
  • Limits bandwidth allocation to non-business
    applications
  • Priority-based bandwidth allocation to critical
    applications
  • Benefits
  • Optimized bandwidth utilization
  • Enables application QoS
  • QoS Quality of Service

10
Our Social Reach
11
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
Cyberoam Technologies
USA Central 1-732-412-4896Delhi NCR
91-9899150300 Ahmedabad 91-9925011328 Bangalo
re 91-9880345671 Dubai
971-4-214 9860
North America 505 Thornall Street, Suite
304 Edison, NJ -08837 USA
Cyberoam House, Saigulshan Complex, Opp.
Sanskruti, Beside White House, Panchwati Cross
Road, Ahmedabad - 380006, GUJARAT, INDIA.
sales_at_cyberoam.com
Write a Comment
User Comments (0)
About PowerShow.com