See Who is Doing What and When Instantly
Accurately identifying the types of applications that are traversing the WAN and the amount of bandwidth they're consuming is one of the toughest challenges network administrators face. The EX Series solves this challenge with the ability to automatically detect popular business applications traversing the WANsuch as P2P, IM and email. With detailed reports outlining bandwidth usage patterns, top talkers, granular traffic-shaping and traffic distribution capabilities, administrators can quickly identify, limit and control applications to prioritize traffic flows.
Identity-Based Application Visibility
Know who is doing "what" and "when" by monitoring application activity and user identities for a variety of Instant Messaging (IM), file transfer, and email applications with Identity Tracking with IP-to-ID.
High Level Data Leakage Monitoring
Application visibility allows a comprehensive log of application data and a free-form text search engine to pinpoint data of interest. In the case of a file transfer, the search flexibility allows viewing of application data to see the original location, filename, user actions to the file and source IP address (or user ID). EX strikes the balance between useful information and administration overhead.
The EX Series can also automatically track the use of popular file transfers, email, and instant messaging applications back to the originating userhelping IT engineers instantly see "who is using which applications." When combined with IDsentrie's IP-to-ID technology, the EX Series can instantly track the use of any WAN application back to the originating user to provide rich identity-based reports and help troubleshoot network and security problems quickly.
Click here to read a Solution Brief on Identity-based Bandwidth Control.