I Ntroductory S Ection - 8e6 Technologies TAR User Manual

Table of Contents

Advertisement

I
NTRODUCTORY
Threat Analysis Reporter
As perimeter security becomes more mature, user-gener-
ated Web threats increase and become critical aspects of
maintaining networks. Network administrators need tools to
monitor these threats so management can enforce corpo-
rate Internet usage policies.
8e6's Threat Analysis Reporter (TAR) appliance is designed
to offer administrators or management dynamic, real time
graphical snapshots of their network's Internet traffic,
supported by remediation tools to manage and control user-
generated Web threats. Working in conjunction with 8e6's
R3000 Enterprise Filter, TAR interprets end user Internet
activity from the R3000's logs and provides data that can be
viewed via an easy-to-read dashboard of gauges the admin-
istrator can drill down into, thereby identifying the source of
the threat.
8
6 T
,
T
E
ECHNOLOGIES
HREAT
S
U
G
A
R
NALYSIS
EPORTER
SER
I
S
NTRODUCTORY
ECTION
ECTION
UIDE
T
A
R
HREAT
NALYSIS
EPORTER
1

Advertisement

Table of Contents
loading

Table of Contents