HARGA : CALL (klik disini untuk informasi harga lebih detil)
PRODUCT CODE : M5100-AC-I-S
The old adage “You can't manage what you can't see” describes the challenges and risks of modern enterprise networks, making a comprehensive Report Center a critical component for IT departments to analyse network traffic. Sanfor IAG M5100 includes an Advanced Report Center supporting numerous report customization options measuring traffic statistics, queries, ranking, times and behaviour of user & user groups, helping enterprises analyse the root causes of all network issues. In addition, as information and data are becoming key business assets, enterprises are paying more attention to preventing potential information leakage and disruptive network activities. Sanfor IAG M5100 boasts refined content and attachment auditing for corporate Instant Messaging programs.
Sanfor IAG M5100 Advanced Report Center records, audits and counts all network behaviour to all unauthorized network behaviour of intranet users in easy-to-read graphical reports. With reports, curves and statistics, IT managers are provided with all the detailed information they need about their network, including Internet access activities, bandwidth consumption and viewed content. Sanfor IAG M5100 reports are self-generating and sent automatically & regularly to an appointed e-mail address to effectively assist in the network design, security and optimization of bandwidth usage.
Sanfor IAG M5100 employs a URL & application database, which helps IT administrators effectively to enforce organization internet compliance by setting specific policies. In addition, as the BYOD trend is becoming more and more popular, mobile devices should be also included in the enterprise network management policy. Sanfor IAG M5100 empower IT administrators to ensure onboarding devices are identified and comply according to assigned acceptable user policy (AUP). Sanfor IAG M5100 also detects and blocks illegal Wi-Fi hotspots to avoid any information leakage from laptops, smartphones or tablets. A wireless endpoint list will display which endpoint is using an illegal Wi-Fi hotspot allowing the IT team to decide whether to block it or not.