Sangfor Internet Access Management
15058
wp-singular,page-template-default,page,page-id-15058,wp-theme-bridge,bridge-core-3.3.4.4,qode-optimizer-1.0.4,qode-page-transition-enabled,ajax_fade,page_not_loaded,,qode-theme-ver-30.8.8.4,qode-theme-bridge,disabled_footer_top,disabled_footer_bottom,qode_header_in_grid,wpb-js-composer js-comp-ver-8.6.1,vc_responsive

Sangfor Internet Access Management

Internet has become a vital platform for most businesses as more and more mission critical applications are being deployed over the Internet. With great opportunity however comes ever increasing risk. Safe guarding intellectual property, protecting against malware usages, implementing Internet access compliance, simplifying network management become the key challenges for IT management, and superior enterprise Internet management tools are needed more than ever for the overburdened IT department.

 

sangfor-iam

Sangfor Internet Access Management (IAM) is the ideal solution designed to tackle enterprise network challenges, offering simplified and reliable Internet access control with the following features:

 

  • Web and Application Access Management
  • Proxy/Caching, Anti-virus options
  • Built-in Firewall, IPsec VPN modules
  • Bandwidth Management
  • Report Center
Monitor, control, and optimize Internet access

SANGFOR Internet Access Management is the solution designed to tackle the network inefficiency and risks that enterprises encounter. IAM provides enterprises with detailed and accurate traffic reports about Internet access activities, bandwidth consumption and access contents. With all access being logged and reported, proper control policies can be set along with the application identification function embedded in the device. Furthermore, bandwidth management and caching technology ensures optimal bandwidth utilization and guarantees performance of critical business applications, minimizing bandwidth investment by delaying or avoiding costly bandwidth upgrade.

Web and Application Access Management

 

While enterprise staff relies on the network for communication, research, business operations and more, it is also a source of recreational activities and inappropriate contents that are occupying the productive working hours of staff, as well as threatening the security of critical and confidential business data. In order to maintain and guarantee a secure and legally complied enterprise network environment, monitoring and managing all network access is a must, and with such business requirement in mind, IAM offers enterprise with comprehensive content-aware visibility and control:

 

Cloud-based Web Filter

Internet is evolving exponentially where thousands of new Internet sites emerge daily, and there can be multiple applications, both work-related and non-related applications, on one single webpage nowadays. With such network nature, Sangfor IAM was designed with a web filtering feature, which dynamically identifies and categorizes the constantly changing content of web 2.0. Along with the advantage of an in-cloud URL database of IAM, it leverages a unique Data Cloud infrastructure to overcome the previous limitations of static on-box database, allowing enterprises to detect and filter the most updated applications.

 

sangfor-iam-1

 

Behavior Analysis and Application Control

Network challenges such as bandwidth abuse, potential information leakage and disruptive network activities have raised the alarm for enterprises to monitor and control both the network behaviors and applications. While the URL database of IAM recognizes and control web based applications, non-web based applications are also identified and controlled by the built-in application control module. The module combines application signature recognition, behavior analysis and dynamic port analysis, providing a high level of application discovery and control capability, regardless of the IP or Port it is using. IAM enables administrator to effectively control users’ application activities and behaviors, by unique policy setting, such as offering permission to specific user/group to use IM chatting while blocking IM video/file sharing during a pre-defined time period, maximizing managerial flexibility and minimizing risks.

 

Monitor and Control Evasive Activities

Encrypted traffics such as https websites and Internet applications like Gmail and Gtalk are likely to run under the radar of the IT department, while these traffics need to be monitored, especially for enterprises that store critical and confidential business data on its network. Having recognized that business need, Sangfor IAM provides enterprises with the ability to recognize and control most typical encrypted traffics, making sure that all network traffics are under surveillance and control of the IT department. It is also equipped to identify and filter usage of public network proxies, encrypted proxy software or behaviors of sharing access authorization via installed proxy software, preventing the possibilities of internal breach with proxy tools.

Benefits that the advanced web and application control module brings:

  • Minimizing risks: Prevents accesses to inappropriate, undesired and unsecured
    sites, minimizing risks associated with Internet connection.
  • Increasing productivity: Empowers organizations to optimally utilize network
    resources and maximizes staff productivity during working hours.

Bandwidth Management and Optimization

 

Non-essential applications such as P2P downloading and online video are not only occupying staff’s productive hours, but can also be abusive which occupies significant amount and portion of bandwidth, leading to slow access to critical business applications, and thus low business productivity. Dealing with such network concern, Sangfor IAM is incorporated with the best-of-breed bandwidth management and optimization module to ensure corporate bandwidth is being utilized productively.

 

Flexible bandwidth management

Having Internet access without bandwidth management is like having cars traveling on a freeway at various speeds without traffic rules and guidance – traffic congestion will occur. To manage and regulate the network traffic with desired settings, IAM dynamically assigns bandwidth to both uplink and downlink, by application/ file type/ website type/ user/ group/ schedule, keeping the network traffic in orders, and guarantee satisfactory performance for prioritized or critical business applications.

 

Dynamic Bandwidth Management

One limitation of static bandwidth management is that once bandwidth is being reserved for certain users, it became unavailable to others no matter in use or not. However, with dynamic bandwidth management mechanism, it enables bandwidth to be allocated in an optimal way among all users within one enterprise, adapting to the bursty nature of traffic flow, with the following feature:

“Bandwidth borrowing” when guaranteed bandwidth for specific applications/users is not fully utilized; Activate the BM policy once bandwidth utilization reaches a pre-defined level of usage; Allow average allocation or free competition options among users in one single traffic pipe; Separated bandwidth management for overseas network access from those for domestic use.

 

Intelligent P2P Identification and Control

P2P control has never been an easy task due to the varying, fast evolving, hopping and dynamic nature of P2P applications. However, with the unique P2P intelligent identification technology embedded in IAM, P2P control is no longer a problem, as enterprises are able to recognize and control both encrypted and unencrypted transmission, protecting the enterprise network from most P2P software.

 

Multi-line and Intelligent Routing

For organizations with multiple Internet access lines, user access performance is optimized by assigning an optimal line for the traffic. In case of line interruption, IAM will automatically route all traffic through the assigned optimal line.

 

Proxy/ caching

Bandwidth is considered an expensive and valuable network asset for most enterprises, and all enterprises would expect this asset to be utilized productively. However, most enterprises are confronted with potential bandwidth waste with unmanaged networks. With such challenge in mind, Sangfor IAM was incorporated with Proxy/cache to reduce duplicated data using a unique “multi-weighted elimination algorithm” web caching technology. With this technology, frequently accessed Webpages, files and flashes are cached in the IAM appliance and once being cached, users would access data from the storage rather than loading all over again from the Internet, reducing 30-50% of Internet traffic and maximizing utilization.

Benefits that bandwidth management module brings:

  • Optimized business application access: Prioritize application traffic, guarantees
    bandwidth availability for critical business applications/users/user groups while
    limiting bandwidth utilization for inappropriate activities.
  • Enhanced bandwidth utilization with lower bandwidth investment: Eliminating
    bottlenecks caused by bandwidth congestion, avoiding or delaying the need for
    bandwidth upgrade, hence lowering the bandwidth cost.

Built-in Report Center

“You can’t manage what you can’t measure” describes the management challenges and risks of a modern enterprise network, and these make the report center a critical component for IT department to analyze network traffics. Having realized the importance, IAM was built with a sophisticated report center that records all network access for the analysis purpose of IT departments, helping enterprises to mitigate any potential network threats being identified.

Accurate Traffic Map

IAM Report Center records, audits, and counts every single network behavior of intranet users in graphical reports. With reports, curves and statistics, IT managers are provided with all the detailed information they need about the network, including Internet access activities, bandwidth consumption and viewed contents. Reports are self-generated by the device and automatically sent to an appointed e-mail address regularly, to assist effective network design, optimized traffic utilization, and secure Internet access policy management.

 

sangfor-iam-4

True Content Visibility and Auditing

The Sangfor IAM report center allows content audit for evidence of compliance. With proper configuration, it is able to audit all contents including IM chatting (Gtalk, Skype, QQ, MSN, Yahoo! Messenger, etc); Email content and attachment (Gmail, Yahoo, etc) and posts (Facebook, Twitter). The content log feature enables organizations to gain ultimate content layer visibility and control, yet archive the audit proofs for possible leakage or legislation requirements.

 

sangfor-iam-5

Benefits that intuitive report module brings:

  • Visible and Effective control: Accurate traffic maps facilitate for effective and
    efficient network design, optimize traffic utilization, and secure Internet access policy
    management.
  • Adequate IT planning: Traffic map provides accurate and detailed information for effective IT planning.

Add-ons

Consolidated Infrastructure  and Simplified Management

Anti-virus engine

The Anti-Virus engine draws on sophisticated heuristic methods, emulation algorithms and definition files to detect potential threats, and with a significantly low rate of false detection, it protects the corporate workstations and servers against viruses, worms, Trojan horses and other malware.

Integration with Enterprise Directory

IAM simplifies management effort and strengthens network security through quick and seamless integration with the organization’s authentication servers: Active Directory, LDAP, Radius, POP3 and Proxy servers.

Intuitive management web console

IAM delivers a task-based management interface, administrators are able to do configuration with simple clicking, simplifying the network management task while reducing the maintenance burden of the administrators.

SPI firewall and IPsec VPN

IAM is also built-in with SPI firewall and IPsec VPN, enabling enterprise with cost-effective, easy and fast deployment of branch networking.

Hierarchical Administration

Enterprises that possess large networks will require decentralized network administrations by various administrators. For such network management, IAM allows individual management by functional model or department, via a highly hierarchical management paradigm. By subdividing managerial authorization to various administrators, it ensures flexible, secured and authorized network management.

SANGFOR Internet Access Management solution tackles the network inefficiency and risks that enterprises encounter. By deploying IAM, business enjoys a manageable, swift and a simple network infrastructure. IAM boosts business productivity by prioritizing the access to business resource and regulating recreational activities during working hours. Furthermore, with efficient bandwidth management and caching technology, IAM minimizes bandwidth investment effectively by delaying or avoiding bandwidth upgrade.

 

IAM is the ideal network appliance that meets the web security, bandwidth management, and reporting need of enterprises. It allows organizations to deploy unified IT policies, quickly and effectively, optimizing Internet access environment at a lower TCO (Total Cost of Ownership).