| Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
|---|---|---|---|---|
| NNTP | 12 | Very High | Very Low | 0.51 |
| NNTP client | 12 | Very High | Very Low | 0.51 |
| Yahoo! Slurp | 4 | Very High | Very Low | 0.00 |
| 0 | High | Low | 0.00 | |
| QQ client | 0 | High | Low | 0.00 |
| Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
|---|---|---|---|---|
| generic audio/video | 12 | Very Low | Medium | 0.22 |
| MPEG | 10 | Low | Medium | 0.08 |
| SIP | 9 | Low | Medium | 0.01 |
| Spotify | 0 | Medium | Very Low | 0.00 |
| Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
|---|---|---|---|---|
| Internet Explorer | 886 | Medium | Medium | 15.51 |
| Firefox | 819 | Medium | Medium | 41.82 |
| Chrome | 445 | Medium | Medium | 1.42 |
| Kerberos | 173 | Very Low | High | 0.18 |
| Mobile Safari | 68 | Low | Medium | 0.42 |
| Application | Times Accessed | Application Risk | Productivity Rating | Data Transferred (MB) |
|---|---|---|---|---|
| SSL client | 377 | Medium | Medium | 2.30 |
| cURL | 1 | Medium | Medium | 0.02 |
| Browser | Version | Number of Hosts |
|---|---|---|
| Internet Explorer | 0 | |
| Google Chrome | 1.0.154.36, 11.0.696.71, 27.0.1453.110, 27.0.1453.94, 28.0.1464.0, 28.0.1500.52, 3.0.198.1, 30.0.1599.101, 37.0.2062.94, 39.0.2171.95, 4.1.249.1042 | 32 |
| Safari | 2.0.4, 3.0.4, 3.1.1, 3.1.2, 3.6.4,, 4.0.4, 4.0.5, 5.0.4 | 13 |
| Firefox | 0.10, 0.10.1, 0.9.1, 0.9.2, 1.0, 1.0.1, 1.0.4, 1.0.6, 1.0.7, 1.5, 1.5.0.0, 1.5.0.2, 1.5.0.4, 10.0.1, 11.0, 12.0, 13.0.1, 2.0, 2.0.0.1, 2.0.0.16, 2.0.0.17, 2.0.0.20, 2.0.0.4, 20.0, 25.0, 3.0.1, 3.0.8, 3.5, 3.6, 31.0, 34.0, 4.0.1 | 246 |
| URL Category | Connections | Blocked | Data Inbound (KB) | Data Outbound (KB) |
|---|---|---|---|---|
| Social Network | 27 | 0 | 0.00 | 63.85 |
| Adult and Pornography | 7 | 0 | 0.00 | 18.42 |
| Client Applications | Web Applications | Application Protocols |
|---|---|---|
| Client applications include web browsers and other desktop applications that access the network. | Web applications are carried over web-related protocols such as HTTP and HTTPS. Many web applications operate on port 80 and/or port 443. | Application protocols are the means by which other applications communicate over your network. Examples include HTTPS and SSH. |
| Total: 108 | Total: 92 | Total: 102 |
| IMAP, NNTP client, RDP, RDP client, TFTP client, … | WebDAV, Yahoo! Slurp, iCloud, Outlook, QQ, … | IMAP, NNTP, RDP, TFTP, WebDAV, … |
| OS Vendor | OS Version | Count |
|---|---|---|
| Microsoft | XP, 7 | 15 |
| RIM | 5.0.0 | 12 |
| Apple | 5.0 | 9 |
| Apple | 4.2.1 | 7 |
| 4.0.3 | 7 |
| File Category | File Type | Protocol | Count |
|---|---|---|---|
| Executables | MSEXE | HTTP | 181 |
| Office Documents | MSOLE2 | HTTP | 55 |
| Executables | BINARY_DATA | HTTP | 47 |
| Archive | JAR | HTTP | 40 |
| Archive | ZIP | HTTP | 32 |
| File Category | File Type | Protocol | Count |
|---|---|---|---|
| Executables | MSEXE | HTTP | 8 |
| Archive | ZIP | HTTP | 5 |
| File Category | File Type | Protocol | Count |
|---|---|---|---|
| New Capability | Benefit |
|---|---|
| Network Map | Profiles hosts on the network, including network infrastructure, desktops, servers, mobile devices, virtual machines, and many others. |
| Application Visibility and Control | Identify and control over 3000 applications. By leveraging OpenAppID, application detectors can be created for custom application. Furthermore, Snort rules can be written to address specific applications. |
| Security Intelligence | With unparalleled visibility into the Internet, Cisco Talos provides dynamic IP and URL black list to protect against malicious websites. |
| Mobile Awareness | Identifies and profiles mobile devices, including iOS, Android, Amazon, Blackberry, and other mobile device types. Identifies jailbroken devices. |
| Real-time Contextual Awareness | Profiles hosts and identifies communications that are of unusual bandwidth or hosts that are running inappropriate applications for the environment. |
| New Capability | Benefit |
|---|---|
| Granular Application Control | Reduce potential area of attack through granular control of thousands of applications. |
| File Identification and Control | Detect and optionally block files by file type. Capture files for offline analysis, if desired. |
| URL Filtering | Control on a database of millions of URLs, by risk or productivity characteristics |
| Virtual Protection | Protect VM-to-VM communications the same as physical network |