Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
---|---|---|---|---|
NNTP | 12 | Very High | Very Low | 0.51 |
NNTP client | 12 | Very High | Very Low | 0.51 |
Yahoo! Slurp | 4 | Very High | Very Low | 0.00 |
0 | High | Low | 0.00 | |
QQ client | 0 | High | Low | 0.00 |
Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
---|---|---|---|---|
generic audio/video | 12 | Very Low | Medium | 0.22 |
MPEG | 10 | Low | Medium | 0.08 |
SIP | 9 | Low | Medium | 0.01 |
Spotify | 0 | Medium | Very Low | 0.00 |
Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
---|---|---|---|---|
Internet Explorer | 886 | Medium | Medium | 15.51 |
Firefox | 819 | Medium | Medium | 41.82 |
Chrome | 445 | Medium | Medium | 1.42 |
Kerberos | 173 | Very Low | High | 0.18 |
Mobile Safari | 68 | Low | Medium | 0.42 |
Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
---|---|---|---|---|
SSL client | 377 | Medium | Medium | 2.30 |
cURL | 1 | Medium | Medium | 0.02 |
Browser | Version | Number of Hosts |
---|---|---|
Internet Explorer | 0 | |
Google Chrome | 1.0.154.36, 11.0.696.71, 27.0.1453.110, 27.0.1453.94, 28.0.1464.0, 28.0.1500.52, 3.0.198.1, 30.0.1599.101, 37.0.2062.94, 39.0.2171.95, 4.1.249.1042 | 32 |
Safari | 2.0.4, 3.0.4, 3.1.1, 3.1.2, 3.6.4,, 4.0.4, 4.0.5, 5.0.4 | 13 |
Firefox | 0.10, 0.10.1, 0.9.1, 0.9.2, 1.0, 1.0.1, 1.0.4, 1.0.6, 1.0.7, 1.5, 1.5.0.0, 1.5.0.2, 1.5.0.4, 10.0.1, 11.0, 12.0, 13.0.1, 2.0, 2.0.0.1, 2.0.0.16, 2.0.0.17, 2.0.0.20, 2.0.0.4, 20.0, 25.0, 3.0.1, 3.0.8, 3.5, 3.6, 31.0, 34.0, 4.0.1 | 246 |
URL Category | Connections | Blocked | Data Inbound (KB) | Data Outbound (KB) |
---|---|---|---|---|
Social Network | 27 | 0 | 0.00 | 63.85 |
Adult and Pornography | 7 | 0 | 0.00 | 18.42 |
Client Applications | Web Applications | Application Protocols |
---|---|---|
Client applications include web browsers and other desktop applications that access the network. | Web applications are carried over web-related protocols such as HTTP and HTTPS. Many web applications operate on port 80 and/or port 443. | Application protocols are the means by which other applications communicate over your network. Examples include HTTPS and SSH. |
Total: 108 | Total: 92 | Total: 102 |
IMAP, NNTP client, RDP, RDP client, TFTP client, … | WebDAV, Yahoo! Slurp, iCloud, Outlook, QQ, … | IMAP, NNTP, RDP, TFTP, WebDAV, … |
OS Vendor | OS Version | Count |
---|---|---|
Microsoft | XP, 7 | 15 |
RIM | 5.0.0 | 12 |
Apple | 5.0 | 9 |
Apple | 4.2.1 | 7 |
4.0.3 | 7 |
File Category | File Type | Protocol | Count |
---|---|---|---|
Executables | MSEXE | HTTP | 181 |
Office Documents | MSOLE2 | HTTP | 55 |
Executables | BINARY_DATA | HTTP | 47 |
Archive | JAR | HTTP | 40 |
Archive | ZIP | HTTP | 32 |
File Category | File Type | Protocol | Count |
---|---|---|---|
Executables | MSEXE | HTTP | 8 |
Archive | ZIP | HTTP | 5 |
File Category | File Type | Protocol | Count |
---|---|---|---|
New Capability | Benefit |
---|---|
Network Map | Profiles hosts on the network, including network infrastructure, desktops, servers, mobile devices, virtual machines, and many others. |
Application Visibility and Control | Identify and control over 3000 applications. By leveraging OpenAppID, application detectors can be created for custom application. Furthermore, Snort rules can be written to address specific applications. |
Security Intelligence | With unparalleled visibility into the Internet, Cisco Talos provides dynamic IP and URL black list to protect against malicious websites. |
Mobile Awareness | Identifies and profiles mobile devices, including iOS, Android, Amazon, Blackberry, and other mobile device types. Identifies jailbroken devices. |
Real-time Contextual Awareness | Profiles hosts and identifies communications that are of unusual bandwidth or hosts that are running inappropriate applications for the environment. |
New Capability | Benefit |
---|---|
Granular Application Control | Reduce potential area of attack through granular control of thousands of applications. |
File Identification and Control | Detect and optionally block files by file type. Capture files for offline analysis, if desired. |
URL Filtering | Control on a database of millions of URLs, by risk or productivity characteristics |
Virtual Protection | Protect VM-to-VM communications the same as physical network |