Bandwidth Management

Indiscriminate Internet surfing and bandwidth-guzzling downloads by internal users often leave enterprises with insufficient bandwidth for business-critical applications. Cyberoam’s user identity-based bandwidth management allows optimum utilization of bandwidth and offers bandwidth control over congestion, preventing bandwidth abuse and resultant choking. Enterprises receive committed, burstable bandwidth, preventing non-critical applications from degrading network performance in addition to gaining control over investment in bandwidth.  

Combined with its multiple link load balancing and gateway failover, Cyberoam bandwidth management offers a comprehensive business continuity solution with optimal bandwidth availability.

Winning the Battle for Bandwidth:

Is your bandwidth choked from music and video downloads?   
Want to allocate guaranteed bandwidth to critical applications and users?
Is your CEO receiving committed bandwidth through the day?
Do you want to allocate 512 kbps to Special Projects from 6 to 9 pm?
Do you know Who is using how much Bandwidth?

Identity-based Bandwidth Management

With Cyberoam Bandwidth Management, enterprises can establish priorities based on users, web category, groups and applications with precise bandwidth allocation based on usage and time of the day. The Cyberoam internet content filtering module complements bandwidth management by blocking access to high bandwidth-consuming audio-video downloads, gaming, tickers, ads and more. This ensures that business and bandwidth-critical applications like CRM, VoIP and more gain guaranteed bandwidth. Enterprises can fine-tune their bandwidth policies based on changing user requirements as well as their usage for continually improved network performance.

 

Committed and Burstable Bandwidth

Enterprises can create bandwidth policies to allocate guaranteed bandwidth to users, assigning minimum and maximum bandwidth to users. Committed bandwidth ensures that critical users receive constant levels of bandwidth during peak and non-peak traffic periods. Burstable bandwidth allocation allows users to receive greater bandwidth when available, ensuring optimal usage of the resource.

 

Time-based Bandwidth Allocation

With Cyberoam Bandwidth Management, enterprises can schedule and regulate bandwidth as per user requirements. High bandwidth can be provided to a user during a particular time of the day when uninterrupted access is required. By doing this, enterprises can lower the peaks in bandwidth usage across the day. This limits the need for bandwidth purchase based on excessively high peaks, controlling operating expenses.

 

Application Layer 7 Management
Cyberoam Application Layer 7 Management enables organizations prioritize availability of applications based on bandwidth along with user and time. This allows them to control bandwidth costs, rising continuously due to the rapid emergence of web-based applications that include cloud-based business applications and social media business tools. By controlling bandwidth for a combination of source, destination and service/service group, they assure availability of business-critical applications and stagger non-critical applications.