You are on page 1of 11

Application Visibility and Control

Top 5 Features & Benefits



Application Visibility and Control??

Application visibility and control offers total visibility and contol


over, which application by which user is being accesed within
the organization, irrespective of their ports and protocols.

It is the best way to avoid application-layer threats, including


malware, phishing, botnets etc.

Cyberoam with layer 7 and layer 8 identity-based policies and


reporting offers application visibility and control over !!!" #ey
applications.

Top 5 Features of Cyberoam's
Application Visibility and Control
$% Application &ecurity
% 'ranular Controls
(% )ser and *ime-based Controls for Application Access
+% ,ayer 8 Identity and -o&-based Application Control
.% -o& for Applications
*QoS= Quality of Service

1) Application Security
Features

It restricts and bloc#s anonymous pro/ies

0revents 1phone home2 activities and #eyloggers

,ayer 7 and ,ayer 8 visibility

3atabase available with inbuilt application category



Benefits:

0revents sophisticated application-based threats including malware,


phishing, botnets

2) Granular Controls
Features:

0ro-active protection model

Applications are categorized based on their level of ris#, characteristics and


technology
Benefits:

0olicies can be set or edited easily for application access with 4ust few
clic#s

5o manual updates needed for new application in networ#



) !ser and Ti"e#based Controls for
Application Access
Features:

Controls usage of social applications and networ#ing sites, such as6


7aceboo#, 8ou*ube etc.

Controls 00 9peer-to-peer% applications, such as6 &#ype

:ifurcates creation of ;hite 9:usiness-critical%, 'rey 9social, entertainment%


and :lac# 9non-productive% application categories based on priority

&chedules non-critical applications during non-pea# hours.





) !ser and Ti"e#based Controls for
Application Access

Benefits:

Controlled bandwidth usage

<nhanced productivity through fle/ibility

&upports business-critical applications

<nsures application security



$) %ayer & 'dentity and (oS#based
Application Control
Features:

Controls usage of application depending upon user, user group,


bandwidth, sources and destination.
Benefits:

<nhanced productivity

=ptimizes usage of bandwidth

&upports user-critical applications, such as >oI0



5) (oS for Applications
Features:

,imits bandwidth allocation to non-business applications

0riority-based bandwidth allocation to critical applications


Benefits:

=ptimized bandwidth utilization

<nables application -o&


*QoS= Quality of Service

)ur Social *eac+

Cyberoa" Tec+nolo,ies
!SA Central : -1#.2#$12#$&/0
1el+i & 2C* : -/1#/&//15333
A+"edabad : -/1#//253112&
Ban,alore: -/1#/&&3$50.1
1ubai: -/.1#$#21$ /&03
Cyberoa" 4ouse5
Sai,uls+an Co"ple65
)pp7 Sans8ruti5
Beside 9+ite 4ouse5
:anc+;ati Cross *oad5
A+"edabad # &33305
G!<A*AT5 '21'A7
Cyberoa" Tec+nolo,ies Cyberoa" Tec+nolo,ies Cyberoa" Tec+nolo,ies Cyberoa" Tec+nolo,ies Cyberoa" Tec+nolo,ies
2ort+ A"erica
535 T+ornall
Street5 Suite = 3$
>dison5 2< #3&&.
!SA
sales?cyberoa"7co"

You might also like