Extreme Networks Policy Manager Bedienungsanleitung Seite 21

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 22
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 20
Extreme Networks Purview
Pervasive – Visibility across the entire enterprise. Most other
solutions are placed at a choke point, limiting the view AND the
scale
Hardware Embedded, Scalable, No Network overlay – N-packet
mirror, CoreFlow2 enables millions of flows with deep packet
inspection (DPI) at Terabit speeds without impacting the
network
Massive and Open / Customizable Signature Set – Currently
supporting more than 6900 applications with over 12,500
signatures that are public and can be easily customized by the
customer, partner, or professional services
Intelligent Application Awareness – uses application layer
metadata: browser user-agent strings, cookie information, SSL
certificate common/organization names, HTTP request
methods, and more. Allows categorization of sub-applications (ie
Google Docs vs Gmail)
Application Health – compare application response with
network response
Contextual integration – use NAC for location, who what,
when, etc. within a single architecture and database. (Apps are
associated with users)
Security – Security teams are eager to have more insight into
application usage among users
Simplified Integration with OpenConnect SDN API – other
applications can be easily integrated. e.g. the Extreme Networks
SIEM product and Splunk software are already integrated
Seitenansicht 20
1 2 ... 16 17 18 19 20 21 22

Kommentare zu diesen Handbüchern

Keine Kommentare