Application Control

Education of end users is never enough to mitigate potential threats that arise due to their use of inappropriate software applications, according to leading analyst firm IDC. Organizations must also have the ability to monitor and prevent the use of these applications at the endpoint.
Apart from hampering workplace productivity, uncontrolled access to chat, mail, FTP, P2P, gaming applications can open new malware entry points in the network. Above all, they are a significant means to illegally transfer confidential data from within the network, leading to financial loss and legal liability for organizations.
Cyberoam Application Control
Cyberoam Application Control regulates application use at the endpoint through granular, policy-based controls over individual users as well as groups. It employs customized application whitelisting to ensure that only authorized applications can be accessed by end users. Organizations can, thus, protect sensitive data from loss, entry of malware while simultaneously boosting employee productivity.
   Application Classes
Application Classes
Cyberoam Application Control allows administrators to create customized groups of application lists. These groups can be used as white lists or black lists to allow or deny access to users and groups based on departments, work profiles and hierarchy. The grouping allows easy retrieval and quick policy enforcement.
The list of application classes can include browsing, instant messengers, office applications, entertainment, FTP utilities, games, mail applications, P2P, utilities and more to begin with. Administrators can however, create extensive customized lists that are relevant to their organization. This classification also allows administrators to reduce the incidence of malware.
Alerts and Archival
While customized alerts inform the administrator regarding attempts to access unauthorized applications, warning messages enhance user education.
Cyberoam Application Control also generates logs of application access which includes time of access, system, user, and application name. These logs enable managers to assess employee work behavior based on their access of unauthorized applications.
Key Features  
Offer granular, policy-based application controls for chat, webmail, gaming, file sharing, FTP and more
Apply policies even when offline
Set alerts and their levels for unauthorized application access
Customize warning messages to users
Set expiry time to disable temporary policies