Product Brochure - High level overview of Cymphonix and how the

Transcription

Product Brochure - High level overview of Cymphonix and how the
CYMPHONIX NETWORK COMPOSER
Reveal.
Optimize.
Protect.
Take Control of Your Internet Connection
Internet content and applica-
Network Composer from
you have is always the content
tions have become indispen-
Cymphonix answers this
you need. It intelligently
sible, mission-critical tools for
crucial question with Secure
prioritizes and manages content
nearly every organization.
Web Gateway appliances that
and bandwidth so Internet
However, all too often crucial
make sure the Internet
applications and hosted services
information and services get
content and applications you
always run the way they’re
lost in the over-whelming
depend on stay secure, fast
supposed to. Plus, Network
volume of irrelevant and
and available.
Composer keeps your organization
safe from dangerous content
recreational Internet content.
So how can you take full
Network Composer provides
and constantly evolving Internet
advantage of everything our
precise, fine-grained control
threats.
connected world has to
over the infinite variety of
offer—without all the dangers,
Internet content that enters
distractions and delays that
come along with it?
your network, so the content
Web traffic and Internet
applications may be
shaped, prioritized
and/or filtered.
Corporate Office
Core Switch
/ Router
Internet
Services
Cymphonix
Network Composer
COMMODITY
INTERNET
WAN
Corporate
Users
Mobile
Users
LDAP
Servers
Web traffic and Internet
applications may be shaped,
prioritized, and/or filtered
prior to reaching the WAN
connection.
Branch Office
Cymphonix
Network Composer
Remote
Users
Reveal
Deep packet inspection and detailed reporting provide total visibility into what network
users are viewing on the Internet, which
applications they’re using and how Internet
threats are affecting your organization. This
detailed, accurate information about the Web
traffic flowing through your organization
allows you to place appropriate limits on users
and keep your organization safe.
Optimize
Precise, fine-grained application control,
bandwidth management and content shaping
capabilities allow you to prioritize bandwidth,
control users and place limits on recreational
content and applications. The result is a fast,
fully-optimized Internet environment where
critical online content and applications are
always available—and where the content you
have is always the content you need.
Protect
Proxy protection, content filtering and other
advanced threat protection capabilities work
together to identify and neutralize today’s most
sophisticated and dangerous Internet threats —
providing you can provide a safe, productive
environment for all users.
Reveal
Gain Total Visibility into Your Content, Applications, and Users
Network Composer brings
APPLICATION VISIBILITY
perfect visibility and control
Monitor application traffic to
to the chaotic and freewheeling
determine bandwidth require-
Internet environment. With
ments and set appropriate
Network Composer, you can
priorities and limits.
see exactly how your students
or employees are using the
INTERNET USAGE VISIBILITY
Internet. Additionally, you can
Know exactly how users are
carefully monitor and control
using the Internet, set appro-
the performance of critical
priate policies and restrictions,
Internet applications, set
and automatically enforce
smart, policy-based limits and
those restrictions.
priorities and run detailed
reports to identify and resolve
DETAILED REPORTING
problems quickly. Together
Gain total visibility and
these capabilities give you the
enhance your ability to
power to reveal exactly how
identify and fix problems with
everyone in your organization
detailed reports on user
is using the Internet, while
activity, application traffic,
providing complete control over
potential Internet threats and
the online content and
much more.
applications your organization
depends on.
Network Composer offers you total
visibility with detailed reports and
real-time traffic monitoring.
“It’s like having a
window into my
network. Before
Network Composer, I
was in the dark.”
Network Administrator
Morgan School District
Optimize
Make the Most of Your Bandwidth
You can’t afford to turn band-
directly into better
width usage into a free-for-
performance—without impos-
all situation where YouTube
ing crude or heavy-handed
competes with critical applica-
“allow or deny” restrictions.
tions and bandwidth-hogging
Internet users are allowed to
BANDWIDTH SHAPING
monopolize your connection.
AND PRIORITIZATION
Network Composer gives you
Place precise limits on the
the ability to precisely define
amount of bandwidth available
and control how much band-
to specific users, groups
width is available for different
or applications.
types of content and applications. Even better, it allows you
CONTENT SHAPING
to carefully prioritize and
AND PRIORITIZATION
dynamically scale bandwidth,
Set limits or prioritize band-
recreational content is still
width based on specific URLs,
available when Internet
domain names, content
traffic is light. This intelligent,
categories, MIME types and
fine-grained control translates
file types.
With Network Composer, you
can create rules that limit the
amount of bandwidth available
for less important contentand reserve bandwidth for
mission-critical applications.
“With hundreds of
users competing for
resources, we needed
to prioritize
mission-critical traffic
and plan for future
growth. Network
Composer made that
easy and delivered a
very quick ROI.”
Gail Dryden
Information Services Manager,
Holt of California
Protect
Keep Your Organization Safe from Hackers and Malware
It’s nearly impossible to keep
SECURE TRAFFIC FILTERING
up with the ever-increasing
Monitor, analyze and filter
volume and sophistication
HTTPS traffic to eliminate
of hackers, malware, and
threats hidden inside
dangerous content living on
encrypted content.
the Internet. With Network
Composer, you won’t have to
ANONYMOUS PROXY
thanks to its security capabilities
PROTECTION
that automatically monitor and
Protect your organization
protect your network from
against today’s most
today’s most sophisticated
sophisticated threats with daily
Internet threats.
filter avoidance updates and
“Everything is moving
online. Applications,
such as Medicaid,
Medicare, external
billing programs
and even programs
designed to research
possible drug
interactions, are now
web-based.”
dynamic content analysis that
CONTENT FILTERING
identifies and blocks dangerous
Automatically detect and protect
anonymous proxies. Network
your network from dangerous
Composer is the only solution
information and ensure users
that delivers hourly updated
can access the content they
protectionagainst anonymous
need through multi-layer
proxies.
Gene Harrison
Network Engineer,
New York Eye and Ear Infirmary
filtering. This includes real-time
INTERNET THREAT CONTROL
dynamic URL categorization,
Block web-based malware and
URL database matching, URL
keyword search and SafeSearch
search engine enforcement.
TM
viruses with advanced
database matching and client
spyware removal capabilities.
Network Composer provides
some of the industry’s most
advanced URL-based and
dynamic deep packet content
filtering capabilities.
Inside Network Composer
Network Composer is a deep-packet, Layer 7 inspection appliance that scans, identifies
and controls incoming and outgoing Internet traffic — and provides advanced bandwidth
management, application prioritization, reporting and threat protection capabilities.
1. Identify
Use deep (layer 2-7) packet
inspection to identify:
Application traffic
Users & groups
URL traffic
Anonymous proxy traffic
Spyware and virus threats
Internet usage trends
= Items To
Filter/Prioritize:
• Application
• URL/Web
• Threats
• Anonymous Proxy
• Users
• HTTPS
= Desired Items
= Encrypted Data
2. Filter
Sort traffic based on
type and origin:
Real-time URL categorization
URL database matching
Keyword detection
Deep HTML inspection
HTTPS filtering
Real-time anonymous
proxy filtering
Web-based threat removal
3. Prioritize
4. Report
Control applications
and dynamically shape
traffic for:
Provide detailed
information about:
Applications
Users
Web sites
Web categories
File & MIME types
Users
Applications
Content
Web usage
Threats
Reinvent Your
Relationship with
the Internet
Network Composer is ready to offer your
organization new levels of Internet safety,
performance and control, so you can
maximize the value and productivity of
your Internet connection. Visit
www.cymphonix.com to learn more and
schedule a live demo.
Call us at: 866.511.1155
Visit our website at: Cymphonix.com

Similar documents

Test Environment set-up for Cymphonix® Network Composer EX

Test Environment set-up for Cymphonix® Network Composer EX b. In the upper left hand corner on the Navigation list, navigate to ‘Report Tab -> Users -> Network Node Overview’. Verify your test machines IP addresses are displayed

More information

Cymphonix Network Composer

Cymphonix Network Composer new 64-bit XLi® operating system. By providing awareness of users, applications and content, Network Composer delivers unmatched visibility and control for your Internet connection. Now you can bas...

More information