Application Visibility & Control

Prioritize applications with Layer 7 & Layer 8 Visibility & ControlsApplication Visibility & Control

Cyberoam offers Application Visibility & Control with Layer 7 policies and reporting, preventing data leakage and sophisticated application-layer threats, including malware, phishing, botnets. The feature supports business applications, secure collaboration, Cloud and SaaS deployments with Layer 7 and Layer 8 identity-based policies.

Cyberoam offers industry-leading coverage for visibility and control over 2000+ key applications. The Application Visibility & Control feature offers complete visibility on which applications are being accessed within the organization and by which user, irrespective of their ports and protocols. This stops sophisticated application-layer threats right at the network perimeter, ensuring Application Security. Based on network access policies, users and their job roles, and time, it offers application control to organizations to accelerate business-critical applications, stagger non-critical applications, selectively accelerate socio-business applications and block undesirable applications to achieve the twin goal of Application QoS and optimal bandwidth utilization. Applications are classified based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.Real-time network logs and reports further allow organizations to promptly re-set network settings for maximum security and productivity.

Feature Feature Description Benefit
Application Security
  • Inbuilt application category database
  • Blocks anonymous proxies Eg. UItra surf
  • Prevents "Phone home" activities and keyloggers
  • Layer 7 & Layer 8 Visibility
  • Prevents sophisticated application-based threats
Granular Controls
  • Classification of applications based on their risk level, characteristics and technology
  • Pro-active Protection model
  • Easily set/edit policies for application access in a few clicks
  • No manual updates required for new applications in network
Visibility & Control over HTTPS-based Micro Apps
  • Deep scans HTTPS-based applications
  • Prevents latent security threats from HTTPS based requests from entering network
  • Helps block or limit access to potentially harmful or non-productive micro-apps
  • Eg., blocking Chat, Messages, Posts, Video and Photo Upload and Commenting on Facebook, Gmail and Google+
User and Time-based controls for Application Access
  • Controls usage of social applications Eg., Facebook, YouTube, iTunes, gaming, BitTorrent based on Time and Layer 8 Identity-based policies
  • Controls P2P applications, Eg. Skype and IM applications
  • Schedules non-critical applications during non-peak hours
  • Enables creation of White (Business-Critical), Black (Non-Productive), Grey (Social, Entertainment) application categories for prioritization
  • Enhanced productivity through flexibility
  • Balanced bandwidth usage
  • Supports business-critical applications
  • Ensures Application Security with comprehensive IM, P2P controls
QoS for Applications
  • Prioritize bandwidth allocation to critical applications Eg. Salesforce, Sharepoint, CRM, ERP, etc.
  • Control bandwidth allocation to non-business applications
  • Delivers Application QoS
  • Ensures optimal bandwidth utilization
Layer 8 Identity and QoS-based Application Control
  • Control application usage based on user, user group, source, destination and bandwidth
  • Supports bandwidth and user-critical applications Eg. VoIP
  • Enhanced productivity
  • Optimizes bandwidth usage