Extreme Networks Policy Manager Uživatelský manuál Strana 21

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 22
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 20
Extreme Networks Purview
Pervasive – Visibility across the entire enterprise. Most other
solutions are placed at a choke point, limiting the view AND the
scale
Hardware Embedded, Scalable, No Network overlay – N-packet
mirror, CoreFlow2 enables millions of flows with deep packet
inspection (DPI) at Terabit speeds without impacting the
network
Massive and Open / Customizable Signature Set – Currently
supporting more than 6900 applications with over 12,500
signatures that are public and can be easily customized by the
customer, partner, or professional services
Intelligent Application Awareness – uses application layer
metadata: browser user-agent strings, cookie information, SSL
certificate common/organization names, HTTP request
methods, and more. Allows categorization of sub-applications (ie
Google Docs vs Gmail)
Application Health – compare application response with
network response
Contextual integration – use NAC for location, who what,
when, etc. within a single architecture and database. (Apps are
associated with users)
Security – Security teams are eager to have more insight into
application usage among users
Simplified Integration with OpenConnect SDN API – other
applications can be easily integrated. e.g. the Extreme Networks
SIEM product and Splunk software are already integrated
Zobrazit stránku 20
1 2 ... 16 17 18 19 20 21 22

Komentáře k této Příručce

Žádné komentáře