Sangfor 最強 IAM Internet Access Management  
 2010-04-01
       
 

http://www.sangfor.com/

Red Apple is a authorized reseller of Sangfor in Hong KOng, Red Apple is providing services of selling, supporting the Sangfor products.

Functions

Powerful recognition ability  
SANGFOR IAM products have the largest built-in URL base in China, which can recognize more than 500 Internet application behaviors. In addition, its webpage smart recognition technologies can realize automatic recognition, classification and management of unknown webpage. And its SSL-encrypted traffic recognition (patented) technologies can filter SSL-encrypted websites and outbound Webmail behaviors. It can also filter posting behaviors on SSL-encrypted forum/BBS based on key words, so as to avoid management vulnerability as a result of encryption. 
SANGFOR IAM products’ feature based file recognition technologies can precisely recognize users’ sending out files after modifying/deleting their extension names or compressing/encrypting them. SANGFOR IAM products can notify administrators to take necessary governance measures to avoid disclosure of organizations’ internal information. 

 

Flexible authorization strategy  
By organizing users into a tree structure based on administration architecture, and in combination with object-oriented on-line strategy, it can realize flexible division and allocation of on-line authorization. It can provide re-use, multi-use, inheritance and coerced inheritance of on-line strategies. Different functions can be set up to meet such complex authorization demands on on-line behaviors’ flexibility, easy-to-use and authorization consistence. 

 

Granular traffic control  
SANGFOR IAM products can efficiently and smartly improve your bandwidth value: to expand organizations’ exit bandwidth at the lowest costs. 
By using multi-line traffic control technologies and on-line traffic smart route-selection technologies, SANGFOR IAM products can easily address cross-operator performance bottlenecks. And their technology of “rotation schedule + layered three-color token barrel” can make sure the max fairness in allocation of users’ intranet bandwidth resources. In addition, they can use QQS, traffic shaping, bandwidth borrowing and other advanced functions to guarantee requirements of critical business/users. 

 

Detailed records of on-line trails  
Nowadays, Public Security Ministry’s regulations, enterprises’ basic internal control codes, SOX Act and other related laws are all imposing requirements on on-line behavior recording. Based on powerful recognition ability, SANGFOR IAM products make sure recording of the most detailed and complete on-line logs, and they can intuitively display log information by using visual reporting tools. 

 

Security protection ability  
Another important reason for management of on-line behaviors is to improve on-line security, so as to deal with risks on Internet. Dangerous plug-ins, malicious scripts and Trojan websites exist everywhere. What can we do if intranet users are infected with Trojan or virus , or are controlled by hackers, resulting in passive secret disclosure? SANGFOR IAM products can make in-depth analysis of packets, recognize and block intranet-borne virus, Trojan, spyware, hackers’ remote control, port scanning and other dangerous behaviors, help your fully improve intranet security and easily tackle the problems above. 
In addition, SANGFOR IAM products’ built-in industry-famous virus-prevention engine can completely search and kill all kinds of virus and Trojan, protecting intranet security from the beginning. 

 

Intelligent management to improve management efficiency  

Another support point for deployment of IAM devices is: to lower enterprise management and operation costs via scientific management. When administrators pre-set on-line behaviors’ risk features and risk coefficients, SANGFOR IAM products’ smart risk reporting functions can analyze and mine logs and automatically “quitting risks, secret-disclosure risks, inefficient work” and other behaviors. Via pre-define thresholds for employees’ on-line time and traffic, the products can realize automatic pop-up of dialog boxes for reminding. Such technologies as audit-free key and audit-free log key can help units avoid over-auditing.  

 

Deployment mode  

Multiple deployment modes support gateways, bridges, multi-bridging, bypass and other methods.  

Users recognition  

To support local authentication, third-party combined authentication, WEB authentication, IP/MAC binding and etc. ; to support SSO function.  

Management function  

To support hierarchy management of Web, CLI and administrators as well as management online users, frozen users and etc.; to support hardware authentication, so as to make sure device access authentication security.  

Terminal recognition  

To detect terminals based on operating systems, system processes, registry and etc. Those terminals incompliant with network security strategies will be not allowed going on line, thus improving intranet security.  

Application recognition  

Webpage recognition  

Built-in massive static URL base. And to support manual addition of webpage addresses and classifications. To filter websites, webpage texts and etc. based on key words; to filter SSL-encrypted websites, network posts and etc.; to support smart webpage classification.  

File type recognition  

To recognize HTTP, FTP and other transmission files; to recognize outbound files, so as to prevent such outbound behaviors as tampering and deletion of extension names as well as compression of files; to support file white-list filtering; to support recognition of encrypted files.  

Application protocol recognition  

Built-in application protocol recognition base. To support manual addition; can recognize Free Gates, limitless browser and other encryption proxy software; can recognize WOW and many other network games. Intelligent P2P recognition technologies can recognize common P2P, encrypted P2P and future P2P software; can recognize MSN, Yahoo! Skype and other scores of IM chat tools; support recognition of voice video, share-trading software, online steam media and etc.  

On-line authorization  

Webpage control  

To support filtering of plain-text and cipher-text webpage; to support file filtering; to support post reading but not post publishing.  

Email control  

To control outbound Email, and to support recording of mail delay trail.  

Separating of dangerous behaviors  

To support blocking of abnormal traffic behaviors, so as to improve intranet security.  

Strategy management  

To support coerced inheritance of strategic objects; and to support enabling and disabling of them.  

Traffic control  

To support multiplexing technologies and smart route-selection; can virtualize one physical line as many virtual lines; to support user-defined traffic-control-free behaviors; to support P2P traffic control; to support traffic control based on application type, website, file type and etc.; to apply TOP N traffic maps.  

On-line trail record  

Real-time monitoring  

To provide many kinds of behavior statistics and real-time ranking, including statistics of virus, attacks dangerous behaviors and etc.  

Data center  

To support built-in data centers and external data centers, and to realize massive log storage.  

Trail record functions  

Powerful trail recording functions, including trail recording of IM, webpage behaviors, post-publishing behaviors, Email behaviors, outbound file and etc.  

On-line security  

To support automatic alarming, ARP-cheating prevention and firewall functions; to support gateway virus-prevention functions and etc.  

Rich reports  

To support self-defined report functions and report exporting functions; to provide Google-like searching functions, so as to fast query what is needed.  

Datasheet :

   
  Red Apple Solutions 紅蘋果科技 Tel: 3422 8842 Fax: 3422 8846 URL: www.ras.hk