Extreme Networks Policy Manager Manual de usuario Pagina 21

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 22
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 20
Extreme Networks Purview
Pervasive – Visibility across the entire enterprise. Most other
solutions are placed at a choke point, limiting the view AND the
scale
Hardware Embedded, Scalable, No Network overlay – N-packet
mirror, CoreFlow2 enables millions of flows with deep packet
inspection (DPI) at Terabit speeds without impacting the
network
Massive and Open / Customizable Signature Set – Currently
supporting more than 6900 applications with over 12,500
signatures that are public and can be easily customized by the
customer, partner, or professional services
Intelligent Application Awareness – uses application layer
metadata: browser user-agent strings, cookie information, SSL
certificate common/organization names, HTTP request
methods, and more. Allows categorization of sub-applications (ie
Google Docs vs Gmail)
Application Health – compare application response with
network response
Contextual integration – use NAC for location, who what,
when, etc. within a single architecture and database. (Apps are
associated with users)
Security – Security teams are eager to have more insight into
application usage among users
Simplified Integration with OpenConnect SDN API – other
applications can be easily integrated. e.g. the Extreme Networks
SIEM product and Splunk software are already integrated
Vista de pagina 20
1 2 ... 16 17 18 19 20 21 22

Comentarios a estos manuales

Sin comentarios