Product Brochure - High level overview of Cymphonix and how the
Transcription
Product Brochure - High level overview of Cymphonix and how the
CYMPHONIX NETWORK COMPOSER Reveal. Optimize. Protect. Take Control of Your Internet Connection Internet content and applica- Network Composer from you have is always the content tions have become indispen- Cymphonix answers this you need. It intelligently sible, mission-critical tools for crucial question with Secure prioritizes and manages content nearly every organization. Web Gateway appliances that and bandwidth so Internet However, all too often crucial make sure the Internet applications and hosted services information and services get content and applications you always run the way they’re lost in the over-whelming depend on stay secure, fast supposed to. Plus, Network volume of irrelevant and and available. Composer keeps your organization safe from dangerous content recreational Internet content. So how can you take full Network Composer provides and constantly evolving Internet advantage of everything our precise, fine-grained control threats. connected world has to over the infinite variety of offer—without all the dangers, Internet content that enters distractions and delays that come along with it? your network, so the content Web traffic and Internet applications may be shaped, prioritized and/or filtered. Corporate Office Core Switch / Router Internet Services Cymphonix Network Composer COMMODITY INTERNET WAN Corporate Users Mobile Users LDAP Servers Web traffic and Internet applications may be shaped, prioritized, and/or filtered prior to reaching the WAN connection. Branch Office Cymphonix Network Composer Remote Users Reveal Deep packet inspection and detailed reporting provide total visibility into what network users are viewing on the Internet, which applications they’re using and how Internet threats are affecting your organization. This detailed, accurate information about the Web traffic flowing through your organization allows you to place appropriate limits on users and keep your organization safe. Optimize Precise, fine-grained application control, bandwidth management and content shaping capabilities allow you to prioritize bandwidth, control users and place limits on recreational content and applications. The result is a fast, fully-optimized Internet environment where critical online content and applications are always available—and where the content you have is always the content you need. Protect Proxy protection, content filtering and other advanced threat protection capabilities work together to identify and neutralize today’s most sophisticated and dangerous Internet threats — providing you can provide a safe, productive environment for all users. Reveal Gain Total Visibility into Your Content, Applications, and Users Network Composer brings APPLICATION VISIBILITY perfect visibility and control Monitor application traffic to to the chaotic and freewheeling determine bandwidth require- Internet environment. With ments and set appropriate Network Composer, you can priorities and limits. see exactly how your students or employees are using the INTERNET USAGE VISIBILITY Internet. Additionally, you can Know exactly how users are carefully monitor and control using the Internet, set appro- the performance of critical priate policies and restrictions, Internet applications, set and automatically enforce smart, policy-based limits and those restrictions. priorities and run detailed reports to identify and resolve DETAILED REPORTING problems quickly. Together Gain total visibility and these capabilities give you the enhance your ability to power to reveal exactly how identify and fix problems with everyone in your organization detailed reports on user is using the Internet, while activity, application traffic, providing complete control over potential Internet threats and the online content and much more. applications your organization depends on. Network Composer offers you total visibility with detailed reports and real-time traffic monitoring. “It’s like having a window into my network. Before Network Composer, I was in the dark.” Network Administrator Morgan School District Optimize Make the Most of Your Bandwidth You can’t afford to turn band- directly into better width usage into a free-for- performance—without impos- all situation where YouTube ing crude or heavy-handed competes with critical applica- “allow or deny” restrictions. tions and bandwidth-hogging Internet users are allowed to BANDWIDTH SHAPING monopolize your connection. AND PRIORITIZATION Network Composer gives you Place precise limits on the the ability to precisely define amount of bandwidth available and control how much band- to specific users, groups width is available for different or applications. types of content and applications. Even better, it allows you CONTENT SHAPING to carefully prioritize and AND PRIORITIZATION dynamically scale bandwidth, Set limits or prioritize band- recreational content is still width based on specific URLs, available when Internet domain names, content traffic is light. This intelligent, categories, MIME types and fine-grained control translates file types. With Network Composer, you can create rules that limit the amount of bandwidth available for less important contentand reserve bandwidth for mission-critical applications. “With hundreds of users competing for resources, we needed to prioritize mission-critical traffic and plan for future growth. Network Composer made that easy and delivered a very quick ROI.” Gail Dryden Information Services Manager, Holt of California Protect Keep Your Organization Safe from Hackers and Malware It’s nearly impossible to keep SECURE TRAFFIC FILTERING up with the ever-increasing Monitor, analyze and filter volume and sophistication HTTPS traffic to eliminate of hackers, malware, and threats hidden inside dangerous content living on encrypted content. the Internet. With Network Composer, you won’t have to ANONYMOUS PROXY thanks to its security capabilities PROTECTION that automatically monitor and Protect your organization protect your network from against today’s most today’s most sophisticated sophisticated threats with daily Internet threats. filter avoidance updates and “Everything is moving online. Applications, such as Medicaid, Medicare, external billing programs and even programs designed to research possible drug interactions, are now web-based.” dynamic content analysis that CONTENT FILTERING identifies and blocks dangerous Automatically detect and protect anonymous proxies. Network your network from dangerous Composer is the only solution information and ensure users that delivers hourly updated can access the content they protectionagainst anonymous need through multi-layer proxies. Gene Harrison Network Engineer, New York Eye and Ear Infirmary filtering. This includes real-time INTERNET THREAT CONTROL dynamic URL categorization, Block web-based malware and URL database matching, URL keyword search and SafeSearch search engine enforcement. TM viruses with advanced database matching and client spyware removal capabilities. Network Composer provides some of the industry’s most advanced URL-based and dynamic deep packet content filtering capabilities. Inside Network Composer Network Composer is a deep-packet, Layer 7 inspection appliance that scans, identifies and controls incoming and outgoing Internet traffic — and provides advanced bandwidth management, application prioritization, reporting and threat protection capabilities. 1. Identify Use deep (layer 2-7) packet inspection to identify: Application traffic Users & groups URL traffic Anonymous proxy traffic Spyware and virus threats Internet usage trends = Items To Filter/Prioritize: • Application • URL/Web • Threats • Anonymous Proxy • Users • HTTPS = Desired Items = Encrypted Data 2. Filter Sort traffic based on type and origin: Real-time URL categorization URL database matching Keyword detection Deep HTML inspection HTTPS filtering Real-time anonymous proxy filtering Web-based threat removal 3. Prioritize 4. Report Control applications and dynamically shape traffic for: Provide detailed information about: Applications Users Web sites Web categories File & MIME types Users Applications Content Web usage Threats Reinvent Your Relationship with the Internet Network Composer is ready to offer your organization new levels of Internet safety, performance and control, so you can maximize the value and productivity of your Internet connection. Visit www.cymphonix.com to learn more and schedule a live demo. Call us at: 866.511.1155 Visit our website at: Cymphonix.com
Similar documents
Test Environment set-up for Cymphonix® Network Composer EX
b. In the upper left hand corner on the Navigation list, navigate to ‘Report Tab -> Users -> Network Node Overview’. Verify your test machines IP addresses are displayed
More informationCymphonix Network Composer
new 64-bit XLi® operating system. By providing awareness of users, applications and content, Network Composer delivers unmatched visibility and control for your Internet connection. Now you can bas...
More information