Indiscriminate Internet surfing and bandwidth-guzzling downloads by internal users often leave enterprises with insufficient bandwidth for business-critical applications. Cyberoams user identity-based bandwidth management allows optimum utilization of bandwidth and offers bandwidth control over congestion, preventing bandwidth abuse and resultant choking. Enterprises receive committed, burstable bandwidth, preventing non-critical applications from degrading network performance in addition to gaining control over investment in bandwidth.
Combined with its multiple link load balancing and gateway failover, Cyberoam bandwidth management offers a comprehensive business continuity solution with optimal bandwidth availability.
Winning the Battle for Bandwidth
- Is your bandwidth choked from music and video downloads?
- Want to allocate guaranteed bandwidth to critical applications and users?
- Is your CEO receiving committed bandwidth through the day?
- Do you want to allocate 512 kbps to Special Projects from 6 to 9 pm?
- Do you know Who is using how much Bandwidth?
Identity-based Bandwidth Management
With Cyberoam Bandwidth Management, enterprises can establish priorities based on users, groups and applications with precise bandwidth allocation based on usage and time of the day. The Cyberoam internet content filtering module complements bandwidth management by blocking access to high bandwidth-consuming audio-video downloads, gaming, tickers, ads and more. This ensures that business and bandwidth-critical applications like CRM, VoIP and more gain guaranteed bandwidth. Enterprises can fine-tune their bandwidth policies based on changing user requirements as well as their usage for continually improved network performance.
Cyberoam firewall appliance also enables bandwidth policies to be created to enable bandwidth allocation to high-priority business traffic, enabling enterprises to deliver uninterrupted access to business critical applications and users. At the same time, they retain bandwidth control over recreational traffic and heavy bandwidth guzzling media applications.
Committed and Burstable Bandwidth
Enterprises can create bandwidth policies to allocate guaranteed bandwidth to users, assigning minimum and maximum bandwidth to users. Committed bandwidth ensures that critical users receive constant levels of bandwidth during peak and non-peak traffic periods. Burstable bandwidth allocation allows users to receive greater bandwidth when available, ensuring optimal usage of the resource.
Time-based Bandwidth Allocation
With Cyberoam Bandwidth Management, enterprises can schedule and regulate bandwidth as per user requirements. High bandwidth can be provided to a user during a particular time of the day when uninterrupted access is required. By doing this, enterprises can lower the peaks in bandwidth usage across the day. This limits the need for bandwidth purchase based on excessively high peaks, controlling operating expenses.