Now more and more enterprises and institutions can not be separated from the support of the Internet, then how to improve the network operating efficiency, reduce operating costs, broaden the scope of business, strengthen communication and collaboration becomes very important. However, as the network in the overall operation of the enterprise play a greater role, by its introduction of the problem to the normal operation of the impact of the enterprise is also more serious, which forced the enterprise managers to re-examine and deeply concerned about the network access to the various problems. At present, the main network problems faced by the managers of enterprises include: how to standardize the behavior of employees ' Internet, how to improve the production efficiency of enterprises, how to protect intranet security, avoid the leakage of corporate secrets, how to use network bandwidth reasonably, how to purify the network bandwidth value, how to clean the Internet use environment,
Easy Management Domain NetSys AC-Q series
Network domain NetSys ac-q internet Behavior Flow Management Series equipment is a network of technology launched a professional Internet behavior management and flow control of hardware equipment, products have a wealth of Internet behavior management audit and professional flow control functions. Internet behavior, users can url, mail, forums, search engines, ftp/http file upload/download, such as filtering, management control, logging and so on. In the field of flow control, with the DPI (Deep Packet Inspect, depth packet detection) technology as the core, support more than 400 kinds of application protocol identification, can be accurate to each session of the packet detection and control. According to the core bandwidth automatic allocation algorithm, traffic priority, random fair queue, etc., provides a series of powerful bandwidth management functions, such as maximum bandwidth limit, guaranteed bandwidth, reserved bandwidth, etc., which integrates the powerful stateful detection firewall function, protects the network from attack, and improves the security of the whole network.
Network domain ac2000-q Internet Behavior Management Gateway
Network Behavior Monitoring:
When it comes to network security, most users are only concerned about extranet security. But in fact, the enterprise's information assets are more than hackers steal, but through the internal leakage. Therefore, although the group has deployed a firewall and other security equipment, but not the network behavior of users to effectively monitor.
· Peer-to-peer Software Usage Restrictions
BT, Electric Mule, qqlive and so on severely occupy the bandwidth, causes other colleagues, the leader and so on complains the network speed is slower. Through the NetSys AC Internet Behavior Management gateway can specify limits including bt/electric Donkey, including some peer-to-peer downloads, to prevent network bandwidth is illegally occupied.
· URL, Process usage restrictions
Working time has nothing to do with web browsing, QQ chat, online shopping, games and so on, employees abuse company computers, pay wages without creating value for the enterprise. The NetSys AC Internet Behavior Management Gateway can prohibit work-related web sites and run unrelated processes.
· URL Log and Analysis
Employees use the Internet connection provided by the company to visit pornographic, anti-government and other objectionable websites, to make illegal remarks or to engage in other illegal activities. As well as the loss of the company's confidentiality caused by the leakage of staff. These internet-related activities are likely to lead to legal action by companies. Administrators can not specifically know that the use of the network can only listen to the situation of employees, can only be a simple record of some IP access, the search is very inconvenient. The NetSys AC Internet Behavior Management Gateway can record and analyze all the employees ' web logs. Analyze the overall website usage of the individual or government. Effective monitoring of network behavior of intranet users