It’s never been easier to decide who, what, when, where, why and how applications are used on your network. Application Control makes it simple to create and enforce acceptable use policies at your company. With Application Control, you can selectively allow, block, or restrict access to applications based on a user's department, job function, and time of day. Once you establish your policy, Application Control allows you to see in real-time what's being accessed on your network and by whom. You can use this information to demonstrate compliance, evaluate employee needs, and refine acceptable use policies.
Allow or Deny Access to Applications by Name or Function (IM File Sharing)
Want to allow Windows Live Messenger but block file transfers? Go ahead. With over 2,500 signatures and behavioral analysis at your disposal Application Control makes it easy to block sub-functions of applications.
Easy Reporting on Application Usage
Take advantage of real-time and historical visibility into what’s being accessed on your network to report on application usage. Use the information to demonstrate compliance, evaluate employee need, and refine acceptable use policies.
Restrict Access by User, Group or Time of Day
Application Control makes it simple to selectively allow, block, or restrict access to applications based on a user’s department, job function, and time of day, and generate reports on usage.
Makes Acceptable Use Policy Enforcement Easy
Establish acceptable use policies for users and groups by category, application, and application sub-function for maximum flexibility. Enforcing acceptable use policies has never been easier.
Intuitive and Effective
Exercise fine-grained control over more than 1,800 applications, organized by category. Application Control lets you drill down from application category ("P2P") to application name ("Facebook") and down to application function ("Facebook Chat"). Find out more about the 1800+ applications included in the product by default.
Signatures...and Then Some
Sophisticated Behavioral Analysis works overtime, regardless of destination address or L7 protocol, to ensure applications that exhibit certain patterns of behavior don't escape the gaze of Application Control — including encrypted applications that are specifically designed to bypass ordinary security measures.
New applications and new versions are released constantly. Application Control stays current with regular application signature updates.
Reporting Out of the Box
Real-time reporting and monitoring are included. That means no additional software to buy in order to have complete visibility into network activity.
All products are protected by the Manufacturer’s warranty, unless otherwise specified. NCDS Canada guarantees that the products shipped to you are free of any defects; should your product be deemed defective we will happily exchange the item. If the item is no longer available, we will issue you a refund. Refurbished Products have a 30 day limited warranty, unless otherwise specified. For more information about product warranties, please see our Warranty Policy.