SlideShare una empresa de Scribd logo
1 de 26
Tel: 0118 907 1600 (South)  Tel: 0151 203 1400 (North) What You Can’t See, Can Hurt You Castle force is an Authorised Reseller of Exinda in the UK http://www.castleforce.co.uk/Exinda/
Experience any of the following? •  Lack  Visibility •  Bandwidth  Congestion •   Slow  Applications •  Need to  Prioritize VoIP •  Performance  Issues •  Bandwidth  Upgrade Network Issues & Pain Points •  User  Complaints •  Always  Break/Fix
Visibility – What You Can’t See  Can  Hurt You
Non Business Apps Create Performance Issues
Recreational Usage Impacts Critical Apps
Bursts of traffic Create Congestion and Packet Loss
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visibility
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visibility
Application Visibility Special Visibility Feature ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Newest Visibility Feature Before After
Active Directory – Visibility at the User Level
User Drill Down – Apps, Conversations, URLs, Hosts
Unified Performance Management (UPM)   Integrates all the components needed to manage bandwidth and improve application performance. All in a single appliance that is the industry’s the most cost effective, complete, and easy-to-use. Visibility, Only the First Step
Control – Take Charge of Your WAN
Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Before After
Application Visibility Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Before After
Optimization – Get the Most from Your Bandwidth
Optimization + Acceleration ,[object Object],[object Object],[object Object],[object Object],[object Object]
Optimization + Acceleration ,[object Object],[object Object],[object Object],[object Object],[object Object],Before Exinda With Exinda Optimization With Exinda Optimization &  Acceleration
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],About Exinda
Another Satisfied Customer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Another Satisfied Customer ,[object Object],[object Object],[object Object],[object Object]
Exinda Business Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exinda Technical Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Evaluation Units Available ,[object Object]
THANK YOU For  more Exinda Product Information  Please contact Castleforce on Tel: +44 (0)118 907 1600 Tel: +44 (0)151 203 1400 Email: info@castleforce.co.uk

Más contenido relacionado

La actualidad más candente

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 

La actualidad más candente (20)

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 

Destacado

Ironkey enterprise with silver bullet service
Ironkey enterprise with silver bullet serviceIronkey enterprise with silver bullet service
Ironkey enterprise with silver bullet service
Castleforce
 
Bluebird
BluebirdBluebird
Bluebird
gsexton23
 
Raport IAB 2006
Raport IAB 2006Raport IAB 2006
Raport IAB 2006
Divbi
 
2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie
Divbi
 

Destacado (10)

Ironkey enterprise with silver bullet service
Ironkey enterprise with silver bullet serviceIronkey enterprise with silver bullet service
Ironkey enterprise with silver bullet service
 
IEEE WCCI 2014
IEEE WCCI 2014IEEE WCCI 2014
IEEE WCCI 2014
 
hj
hjhj
hj
 
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
 
Bluebird
BluebirdBluebird
Bluebird
 
Raport IAB 2006
Raport IAB 2006Raport IAB 2006
Raport IAB 2006
 
2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie
 
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania UniversityThe Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar a What You Cant See Can Hurt You

Aceleracion de aplicaciones
Aceleracion de aplicacionesAceleracion de aplicaciones
Aceleracion de aplicaciones
jfth
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
Tonya Williams
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
F5 Networks
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
Patricio Campos
 
CloudSmart Webinar
CloudSmart WebinarCloudSmart Webinar
CloudSmart Webinar
nloek
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is down
Compuware ASEAN
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentation
Advanced comm
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
 
F5 GOV Round Table - Securing Application Access
F5 GOV Round Table - Securing Application AccessF5 GOV Round Table - Securing Application Access
F5 GOV Round Table - Securing Application Access
Tzoori Tamam
 

Similar a What You Cant See Can Hurt You (20)

Wx Customer Preso
Wx Customer PresoWx Customer Preso
Wx Customer Preso
 
Cascade
CascadeCascade
Cascade
 
Aceleracion de aplicaciones
Aceleracion de aplicacionesAceleracion de aplicaciones
Aceleracion de aplicaciones
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
IT Operations Management with OpManager
IT Operations Management with OpManagerIT Operations Management with OpManager
IT Operations Management with OpManager
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
CloudSmart Webinar
CloudSmart WebinarCloudSmart Webinar
CloudSmart Webinar
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is down
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentation
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
WWT IWAN Technical Presentation
WWT IWAN Technical PresentationWWT IWAN Technical Presentation
WWT IWAN Technical Presentation
 
Cascade 10.5: Visibility & Control
Cascade 10.5: Visibility & ControlCascade 10.5: Visibility & Control
Cascade 10.5: Visibility & Control
 
F5 GOV Round Table - Securing Application Access
F5 GOV Round Table - Securing Application AccessF5 GOV Round Table - Securing Application Access
F5 GOV Round Table - Securing Application Access
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance Management
 
Network Physics
Network PhysicsNetwork Physics
Network Physics
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

What You Cant See Can Hurt You

  • 1. Tel: 0118 907 1600 (South) Tel: 0151 203 1400 (North) What You Can’t See, Can Hurt You Castle force is an Authorised Reseller of Exinda in the UK http://www.castleforce.co.uk/Exinda/
  • 2. Experience any of the following? • Lack Visibility • Bandwidth Congestion • Slow Applications • Need to Prioritize VoIP • Performance Issues • Bandwidth Upgrade Network Issues & Pain Points • User Complaints • Always Break/Fix
  • 3. Visibility – What You Can’t See Can Hurt You
  • 4. Non Business Apps Create Performance Issues
  • 6. Bursts of traffic Create Congestion and Packet Loss
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Active Directory – Visibility at the User Level
  • 12. User Drill Down – Apps, Conversations, URLs, Hosts
  • 13. Unified Performance Management (UPM) Integrates all the components needed to manage bandwidth and improve application performance. All in a single appliance that is the industry’s the most cost effective, complete, and easy-to-use. Visibility, Only the First Step
  • 14. Control – Take Charge of Your WAN
  • 15.
  • 16.
  • 17. Optimization – Get the Most from Your Bandwidth
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. THANK YOU For more Exinda Product Information Please contact Castleforce on Tel: +44 (0)118 907 1600 Tel: +44 (0)151 203 1400 Email: info@castleforce.co.uk

Notas del editor

  1. A lot of times people feel the pain before they actually know what’s causing it. Before you can treat a problem, you need to identify the root cause and diagnose it before taking corrective action. Don’t play a guessing game, wasting time and money fixing something that isn’t broken or the cause of your pain. Aim to be efficient, address issues before they become problems, and have the information that allows you to plan and get the most out of your budget.
  2. WHY YOU NEED VISIBILITY ================= Without Network Visibility, an IT staff is essentially flying blind, with no accurate way of knowing: What is causing network problems I need a bandwidth upgrade? What applications are on the network? How are critical applications performing/what are the response times?
  3. Streaming Recreational P2P Social Networking Games
  4. WHAT VISIBILITY GIVES YOU ================== The ability to prevent and diagnose network issues. Understand which applications and users are consuming your bandwidth
  5. HOW VISIBILITY WORKS ================ Layer 2 through 7 Monitoring - Gives you complete visibility from the data link layer all the way to the application layer 2 engines for identifying traffic A Signature based engine to identify P2P, HTTP, VoIP, Citrix, Messaging, Streaming Video and Radio traffic... and a Heuristics / Behavioral based engine to classify those applications and protocols that are more difficult to classify because they are either fully encrypted, intentionally hard to read and understand or use port hoping and probing . As its name suggests, we identify it based on its behavior once on a network. Examples are Encrypted Apps, Bit Torrent, Skype Deep Drill Down Inspection – This correlate hosts / application usage and breakdown Top Talkers, Conversations – See who and what are consuming the most network resources Real Time Monitoring Measurement of Application Response Time – Helps to identify issues before they become problems. Also, helps to reduce user complaints about application performance. With visibility and monitoring provides insight into the behavior of the WAN. Almost all Exinda installs identify that the customer’s WAN is inefficient due to some level of non-business usage.
  6. NEWEST FEATURE – ACTIVE DIRECTORY INTEGRATION ================================== No one else is really doing this in our space, and its kind of surprising because it sort of defies logic. If you are an AD user it makes your life a lot easier if you can view names or groups rather than IP addresses, especially in dynamic AP address environments Why You Need It -------------------- Before you would have to look up which IP addresses correlated with which users. Now it is done for you. Allows you to report and digest information the way you want it, saving you time and money and the ability to make decisions and react quicker. How it Works ------------------- An agent simply resides on domain controller(s) to map username to IP address and inject Active Directory username and group information into Exinda appliances Best Of All ------------------- No additional cost for this feature, it comes free of charge on all Exinda appliances Visibility and monitoring provides insight into the behavior of the WAN. Almost all Exinda installs identify that the customer’s WAN is inefficient due to some level of non-business usage.
  7. Visibility is only the first step, you need a complete solution that gives you the ability to diagnose, treat, and monitor your network
  8. Precise policy-based traffic management and control: Perform Diffserv Packet Classification and Marking Advanced L7 Capabilities Hostname, URL, HTTP file wildcard downloads (*.exe, *.iso, *.zip) Traffic Discard/Block Time of Day Policies Adaptive Response Set network policy to properly support high priority users and traffic Prioritize instructional and administrative traffic Block or throttle back recreational apps Understand how the network is being used: - P2P traffic - Top applications, URLs - Performance statistics at various times throughout day - Determine how recreational traffic impacts administrative / instructional performance Identify “unwanted” recreational traffic
  9. IT organizations can fully experience the four main benefits of WAN optimization by using the most advanced optimization technology:   Precise Policy Based Traffic Management   Provide Bandwidth Guarantees to the Business critical Applications!! Limit or block recreational or NON business applications
  10. Adding application acceleration allows further increases in efficiency and allows organizations to realize costs savings – from both employees productivity gains as well as hard costs such as preventing the need for a bandwidth upgrade or allowing the same network to support more users or additional applications. With Exinda, you can select the types of traffic to accelerate as opposed to simply accelerating all traffic on your network including the good and the bad. The benefit of acceleration technologies is improved response times for critical applications. The result is that users are spending their time using the application rather than waiting for their applications to respond/open/download etc. Not only does the application feel better to the user but the quality of experiences is also improved – users aren’t frustrated, help desks are overwhelmed with calls about poor performance, management isn’t racking their brains dealing with the problems.
  11. O ur growing customer base spans all industry verticals with a concentration of customers in education (K-12 and higher ed), commercial business, service providers and government.