Layer 7 and Layer 8 Bandwidth Allocation |
![](http://www.cyberoam.com/images/blackarrow.png) |
Prioritizes business-critical applications and users for bandwidth allocation |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Prioritization based on source, destination, user, service, service group |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Assured QoS for business-critical applications like VoIP, CRM |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
A bandwidth manager that supports bandwidth requirement for Cloud, SaaS applications |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Prevents congestion and bandwidth abuse |
|
|
Web Category-based Allocation |
![](http://www.cyberoam.com/images/blackarrow.png) |
Bandwidth allocation based on website categories: webmail, social media, gaming, entertainment etc. |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Upload, download limits |
![](http://www.cyberoam.com/images/blackarrow.png) |
Layer 8 Identity-based policies with category-based allocation |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Enhanced productivity with Web Filtering |
|
|
Time-based Allocation |
![](http://www.cyberoam.com/images/blackarrow.png) |
Bandwidth scheduling by time of the day |
![](http://www.cyberoam.com/images/blackarrow.png) |
Committed bandwidth to business-critical applications during scheduling |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
A bandwidth manager that balances peaks and troughs in bandwidth consumption |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Assured QoS for business-critical applications |
|
|
Committed & Burstable Bandwidth |
![](http://www.cyberoam.com/images/blackarrow.png) |
Committed bandwidth to critical users at all times |
![](http://www.cyberoam.com/images/blackarrow.png) |
Policies to assign idle bandwidth to other applications automatically |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Optimal use of idle bandwidth |
![](http://www.cyberoam.com/images/blackarrow.png) |
Limits capital expense in excess bandwidth purchase |
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Delivers ROI |
|
Logging & Reporting |
![](http://www.cyberoam.com/images/blackarrow.png) |
Multiple WAN link bandwidth reporting |
![](http://www.cyberoam.com/images/blackarrow.png) |
Options of on-appliance reporting and centralized reporting with CCC and Cyberoam iView |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Supports optimal use of bandwidth with visibility into bandwidth usage |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Identifies network attacks through excess bandwidth consumption patterns |
|
|
![](http://www.cyberoam.com/images/blackarrow.png) |
Helps meet regulatory compliance |
|