Differences between traffic management products and online behavior management products

Source: Internet
Author: User

What is the difference between traffic management and online behavior management? Essentially, there are many differences between the two, mainly reflected in:

  • Different product start points

-  Internet behavior management: the starting point of "person" management is to control the Internet access of employees according to permissions. The main goal is to standardize the Internet access behavior of employees. By prohibiting some Internet access behavior of employees, the goal is to provide the work efficiency of employees and reduce the legal risks of the Organization. For example, record employees' Internet access logs, prohibit employees from accessing certain types of websites, or prohibit certain employees from using software such as stocks and games based on their permissions, prevent the use of the Internet to spread pornographic content, network leaks, online rumors and illegal comments. It is a product that focuses on network security and focuses more on how to securely use the network.

-  Traffic management: it is based on "network application traffic" and ensures the service experience of key applications and key users with limited network resources, block or restrict non-critical or low value-added services. It is a network-managed product that focuses more on how to make good use of the network.

  • Product features are different

-  Online behavior management: user-based monitoring, log auditing, webpage access control, traffic monitoring, anti-virus, and reports.

A. the online behavior management product detects the data traffic type and content (Layer 4/Layer 4). It will detect the network application types used by users, at the same time, it also caches its content to the storage medium for content-level detection. This requires high processing performance and storage space, and generally only processes traffic of several hundred megabytes, it cannot be used in high-traffic scenarios.

B.Policies are used to set various complex permissions to determine who can do what and who can't do what. It is a simple control logic that passes and blocks, and cannot implement quantified QoS, that is to say, bandwidth assurance and network resource optimization cannot be achieved, and some online behavior management products can implement quantified QoS. However, when the function is enabled, a considerable amount of system resources will be consumed, this causes system instability.

-  Traffic management: analyzes and manages Application Layer Based on Traffic, and analyzes and controls application traffic based on users.

A. the application-layer traffic analysis is the main component (Layer 4). The analysis result is only traffic statistics, rather than traffic content. Therefore, such devices do not need a large storage space, in addition, it can achieve up to 10 Gbit/s line rate processing capability based on hardware feature matching. The support for the content layer (Layer 4) is weak. Some products have added some URL filtering and audit log functions, but the support depth and capacity are limited, which is inferior to the online behavior management product.

B. policies are used to set which application or individual is faster (guaranteed) and which application or individual is slower (restricted). This not only supports simple pass and block control logic, it also supports the assurance of key network applications and the restrictions on non-critical network applications through quantification.

  • Different Application customer groups

-  Internet behavior management: if the Organization needs to strictly manage and control Internet access, it is more appropriate to manage internet behavior.

Although online behavior management products also have some traffic control functions, they are very simple and ineffective. Generally, they can only control personal traffic and cannot control application traffic, even more, the bandwidth of key applications and important personnel cannot be guaranteed, and the accuracy of traffic control is much lower. From the performance point of view, because of the many features of behavior management, the performance is poor and cannot meet the requirements of m or more full-function enabling;

-  Traffic management: if the organization wants to make everyone access the Internet faster, ensure the bandwidth of key applications, and the traffic management product is more suitable.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.