vicomsoft top banner
Topology
InterGate Intercept sits at the edge of your network monitoring all incoming and outgoing traffic. It recognizes Instant Messaging and Peer-to-Peer traffic using application signatures. This means that it examines individual network traffic packets to see what application has generated them. If the packet has been generated by a forbidden application, the packet will be refused. InterGate Intercept also uses heuristics. This means that it analyses traffic, looking for behavior patterns typical of forbidden applications that do not identify themselves with a signature as any legitimate application should.

In bridging mode, all network traffic must pass through Vicomsoft Policy Manager, as there is no physical access to the Internet otherwist. This means that you have total control over Instant Messaging and Peer-to-Peer traffic flowing over your network. InterGate Intercept topology

page base
Home| Products| Downloads| Company| Support| Contact us| Library| Channels| Privacy| Ts&Cs
Content of this page in its entirety is protected by US & UK Copyright © 2009 Vicomsoft Ltd.
Reproduction in electronic and written form is expressly forbidden except for personal use.
Anti Spam| Antispam| Anti-spam| Content Filter| Content Filtering| Email Filter| E-mail Filter| Email Filtering| E-mail Filtering| Email Filtering Software| Employee Monitoring| Filtering Software| Internet Abuse| Internet Content Filter| Internet Filter| Internet Filtering| Internet Filters| Internet Management| Internet Monitor| Internet Monitoring| Phishing| Porn Filter| Porn Filters| Spam| Spam Filter| Spam Filtering| Spyware| Web Filter| Web Filtering| Web Filters| Instant Messaging| AIM| AOL Instant Messenger| ICQ| Yahoo Messenger| MSN Messenger| Peer-to Peer| P2P| eDonkey| Emule| Kademlia| BitTorrent| Gnutella| Morpheus| LimeWire| Kazaa| Internet telephony| Skype