Network Control. Simplified.
Are employees spending too much time on non-productive sites like Facebook, Netflix, iTunes and YouTube? Sentry allows you to easily manage and control the sites your employees can access, regardless of their physical location within the organization.
Layer 7 application detection provides identification and control over each application type.
Granular access policies in conjunction with Microsoft AD provides unmatched control.
Do you need control over who has access to specific files? Whether employee, contractor, or consultant, Sentry Active Directory integration allows specific user control, regardless of their physical location.
Are employee-owned mobile devices clogging your network? Sentry easily manages the BYOD explosion by limiting their access to web content, freeing up network resources in the process.
Mobility and BYOD are both threats to networks. Mobile devices frequently increase network traffic that support non-business activities.
Is your organization having bandwidth issues? Sentry quickly and easily allows you to control the bandwidth on your network using industry-standard QoS and bandwidth shaping tools.
Layer 7 Application Detection
Do you want to know what applications are on your network? Sentry lets you easily monitor your network‘s application traffic, detecting hundreds of types of Layer 7 applications.
Do you want to know how your network‘s bandwidth is used? Sentry provides instant reports of your bandwidth usage, broken out by websites and applications.
Do you want to know how much bandwidth a user might be using? Sentry provides visibility with flexible “drill-down” views on network use by user.
Is it painful and time consuming to explain network problems to IT senior management? With Sentry you can pull reports on all aspects of your network and users, reducing the amount of time and resources necessary to manage your network security.
Has malware gone crazy on your network? Stop the problem before it enters your network. Sentry easily detects and blocks malware, and prevents virus activity from propagating.
Malicious content filtering
Illegal content filtering
Intellectual Property Protection
Sentry provides comprehensive malicious code scanning for malware, viruses, and spyware using leading detection algorithims that are updated, and propagated to your Sentry appliance immediately on release. Time-to-protection is unmatched by any other service.
Are you worried that users will accidentally visit malicious websites? Sentry protects your network against an extensive database of known malicious sites, phishing sites, and criminal malware sites.
Protecting Intellectual Property
Are you worried that malware has exposed your intellectual property to theft? Sentry has the tools to easily monitor and detect malicious, downloaded software like trojan viruses and worms that attempt to steal your intellectual property.