• Filtering illegal, harmful and inappropriate web content
• URL pre-classification tech.
• URL auto-classification engine and daily updating
• Over 40 million URL database
• Policy control of Internet application usage
• Bandwidth management of Internet connections
• DPI+DFI technologies
• 11,000+ popular Internet app. signature database
• User with organization context is the core element of management policy
• 30+ kinds of user identification methods (AD, 802.1x…)
• Content auditing and filtering policy to prevent sensitive data leakage
• Many types of content filtering, such as email, web mail, web forum, keywords searching, FTP, IM file sharing…
• Support HTTPS decryption
• All the users online behavior is recorded and audited
• Analysis for compliance with laws and regulations, effective use of network resources, etc.
• Query, search and statistic reports
• Detect and pin-point network/traffic anomaly, take proactive action in real time.
• Block access to sites associated with spyware, phishing and malicious mobile code.
• Block communications initiated by malwares like Trojan, Spyware and Virus.
• Provide comprehensive monitoring and analysis to evaluate employee productivity loss due to non-work-related network activities.
• Control 11,000+ protocols and applications, including P2P download, IM, Streaming media, online Gaming, brokerage and trading.
• Enforce policy according to user, application and content.
• Provide visibility of network traffic, composition and trends so as to setup appropriate traffic control policies.
• Guarantee bandwidth required for critical applications.
• Limit or block the bandwidth-consuming/harmful applications to avoid traffic congestion and resource waste.