In order that staff could gain the updated market information and communicate with external parties, company network should be the internet unceasingly. However, some staff made use of the network to visit illegal website, chat online and share resources via P2P tools illegally during office hours. The inappropriate usage of network caused the following problems:
(1) Addicted to instant messenger to chat with others and visit some websites which is unrelated to the job; and it lessens the working efficiency;
(2) Use company network to download document via BT or use P2P software, which greatly consume the limited bandwidth resources of the company;
(3) Be infected with virus and Trojan easily, which break down the whole network system
(4) Leak confidential information via email and MSN;
(5) Act illegal behavior in the internet, which causes loss of the company
All above problems could be resolved by IAM. IAM helps management team instantly get the detail information of network operation, analyze and discover the potential problems so as to guide them a right direction to resolve it. IAM, as the advanced internet access management solution within China, has the powerful functions and properties and can meet many requirements of the customer. It provides many identification modes for customers’ access, such as users’ name, IP-MAC binding, USB-KEY identification and the integrated identification by linking LDAP and Radius, which simplifies the deployment and offers the organization a strict identification pattern. It helps create a comprehensive and safe network environment for enterprises.
1. Standardize Online Behavior (E.g. block MSN, You Tube & Online Game) in order to enhance working efficiency
It is quite common that staff do personal stuff during working hours. Management Team feels difficult to prohibit that they do something unrelated to the job, such as chat via MSN and play online game etc., which is negatively affect the productivity. However, IAM greatly reduces these kinds of behavior and concentrate staff on work.
2. Control the Usage of Bandwidth
The usage of PSP software always occupies a high proportion of the bandwidth. To deal with this problem, IAM is definitely useful as it restricts the usage of bandwidth for specific online applications, like P2P software. Users can base on the group, time and applications to adjust the bandwidth for all online applications. It assures schools to maintain good bandwidth management and prevent abuse it.
3. Improve the Security of Internal Network
It is a common problem that staff visits porn website or download unknown file which might induce virus and Trojan to attack the PC. However, the filtering function from IAM eliminates this problem.
4. Avoid the Leak of Confidential Information
Staff might unconsciously leak confidential information when using online software to communicate with external parties. IAM provides rich functions to filer all the information sent out from the company, including email content and chat content from IM. It greatly reduces the possibility of leaking confidential information.
5. Standardize Online Behavior and Reduce
Staff might make use of the internet resource from the company to do some illegal acts, such as downloading or issuing porn photos and videos, which cause their company to violate the law. IAM can create detail report about such behaviors from staff and prevent it.
Functions:
Field |
Functions |
Detail |
Control |
Obstruct dangerous website |
Classify all website with any porn information and virus, and obstruct to visit it |
Control strategy |
Based on the group, time, services and content to restrict the website they browse |
|
Obstruct P2P |
Filer the content in all PSP software, such as MSN, SKYPE and BT |
|
User Identification |
Web login to identify the user |
|
Control of document download/upload |
Restrict the download/upload speed in http and ftp, and the file transferring speed in P2P software |
|
Protect confidential information |
Obstruct the confidential data via http, ftp, smtp, imap |
|
Investigation |
Email investigation |
Email can only be send out after investigation |
Instant control |
Instantly control online behavior |
|
Bandwidth control |
Based on the usage of bandwidth from different users, protocol and time to conduct detailed analysis, and optimize the usage of internet resources |
|
Management |
Rights of Administration |
Various management level and have different rights |
Local and remote management |
GUI |
|
Backup |
Use the encrypted document for system backup |
|
Firmware upgrade |
Gain updated version and functions via remote upgrade |
|
Auto Recovery |
Provide the function of auto recovery |
|
Log |
Log backup |
Support auto backup |
Data center |
IAM provide data center for detailed analysis |
|
Features |
Internet port |
PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN |
Protocol |
IPv4、IPv6 |
|
Network |
WAN、DMZ、LAN |
|