1.866.486.2426

Network Control. Simplified.

Web Content

Are employees spending too much time on non-productive sites like Facebook, Netflix, iTunes and YouTube? Sentry allows you to easily manage and control the sites your employees can access, regardless of their physical location within the organization.

Layer 7 application detection provides identification and control over each application type.

Granular access policies in conjunction with Microsoft AD provides unmatched control.

User Content

Do you need control over who has access to specific files? Whether employee, contractor, or consultant, Sentry Active Directory integration allows specific user control, regardless of their physical location.

Mobile Devices

Are employee-owned mobile devices clogging your network? Sentry easily manages the BYOD explosion by limiting their access to web content, freeing up network resources in the process.

Mobility and BYOD are both threats to networks. Mobile devices frequently increase network traffic that support non-business activities.

Bandwidth

Is your organization having bandwidth issues? Sentry quickly and easily allows you to control the bandwidth on your network using industry-standard QoS and bandwidth shaping tools.

Endless Visibility.

Layer 7 Application Detection

Do you want to know what applications are on your network? Sentry lets you easily monitor your network‘s application traffic, detecting hundreds of types of Layer 7 applications.

Program
Category
4Shared.com
File Transfer
Adobe Flash Player
Streaming Media
Amazon.com
Web Services
Anon.me
Proxy
Apple Quick Time
Streaming Media
Apple Talk
Networking
Apple Update
File Transfer
Astaro SSL VPN Client
VPN and Tunneling
Bejeweled Blitz
Games
BitDefender
File Transfer
BitTorrent
File Transfer
Blogger
Web Services
Cisco SLA
Network Monitoring
Cisco SYSMAINT
Networking
Citrix XenDesktop
Remote Access
CNET
Web Services
Dropbox
File Transfer
Facebook
Social Networking
Farm Ville
Games
FileMaker
Networking
Gmail
Mail
Google Analytics
Web Services
Google Talk Web Client
Messaging
GoToMeeting
Collaboration
Grooveshark
Streaming Media
Groupon
Web Services
HideMy.Info
Proxy
Hotmail
Mail
Hulu
Streaming Media
iTunes
Streaming Media
Java Remote Method Invocation
Networking
Limit Killer
Proxy
LogMeIn Ignition
Remote Access
Lotus Notes
Collaboration
match.com
Social Networking
Microsoft Outlook
Mail
Microsoft SQL
Database
Mini SQL
Database
mIRC
Messaging
Naverisk
Network Monitoring
Ninja Saga
Games
Novell Groupwise
Collaboration
Open Webmail
Mail
OpenLDAP
Database
openswan
VPN and Tunneling
OpenVPN Client
VPN and Tunneling
Oracle SQL *NET
Database
Pawn Stars
Games
Pinterest
Social Networking
SAP HostControl over SOAP
Network Monitoring
SecurePoint
VPN and Tunneling
Sharepoint
Collaboration
ShowMyPC
Remote Access
Site Surf
Proxy
Skype
Messaging
Sourceforge
Social Networking
Steam
Games
Teamviewer
Remote Access
Tripwire
Network Monitoring
Twitter
Social Networking
Unidata LDM
Networking
Vidalia
Proxy
Viscosity
VPN and Tunneling
VMWare View
Remote Access
WebEx
Collaboration
Windows Explorer
Database
Windows Live
Messaging
Yahoo WebMessenger
Messaging
Yahoo! Mail
Mail
Zoho Site24x7
Network Monitoring
Sentry detects more than 900 applications

Bandwidth Usage

Do you want to know how your network‘s bandwidth is used? Sentry provides instant reports of your bandwidth usage, broken out by websites and applications.

By User

Do you want to know how much bandwidth a user might be using? Sentry provides visibility with flexible “drill-down” views on network use by user.

Reporting

Is it painful and time consuming to explain network problems to IT senior management? With Sentry you can pull reports on all aspects of your network and users, reducing the amount of time and resources necessary to manage your network security.

Enforced Protection.

Malware Protection

Has malware gone crazy on your network? Stop the problem before it enters your network. Sentry easily detects and blocks malware, and prevents virus activity from propagating.

Malicious content filtering
Illegal content filtering
Intellectual Property Protection

Sentry provides comprehensive malicious code scanning for malware, viruses, and spyware using leading detection algorithims that are updated, and propagated to your Sentry appliance immediately on release. Time-to-protection is unmatched by any other service.

Web Content

Are you worried that users will accidentally visit malicious websites? Sentry protects your network against an extensive database of known malicious sites, phishing sites, and criminal malware sites.

Protecting Intellectual Property

Are you worried that malware has exposed your intellectual property to theft? Sentry has the tools to easily monitor and detect malicious, downloaded software like trojan viruses and worms that attempt to steal your intellectual property.

See Sentry. Try Sentry. Buy Sentry.

See it.

Try it.

Buy it.

Customers who have simplified their IT challenges with Cymtec solutions.