T Hreat A Nalysis R Eporter I Ntroduction - 8e6 Technologies Threat Analysis Reporter TAR Quick Start Manual

Threat analysis reporter
Table of Contents

Advertisement

t
a
r
i
hreat
nalysis
eporter
ntroduCtion
Thank you for choosing to evaluate the 8e6 Technologies Threat Analysis Reporter. This
product addresses user-generated Web threats such as excessive use of bandwidth
and inappropriate Internet usage, and provides network administrators tools to monitor
such threats so management can enforce corporate Internet usage policies.
Working in conjunction with 8e6's R3000 Enterprise Filter, the Threat Analysis Reporter
translates end user Internet activity from the R3000's logs into dynamic graphical snap-
shots of network Internet traffic. Using remediation tools in the console, administrators
and management can then manage and control user-generated Web threats in real
time.
The TAR HL and SL server models include RAID technology for fault tolerance and high
performance.
8
6 T
a
r
Q
s
G

e
hreaT
nalysis
eporTer
uick
TarT
uide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tar hl-005-004Tar sl-004-004Tar msa-004-004

Table of Contents