Title: 
Cymphonix Network Shaping Appliance Adds Ability To Block Torpark Usage To Web And Content Filtering

Word Count:
466

Summary:
Torpark signature and ability to block anonymous proxies give network administrators greater control over their Internet data stream.  Network Composer Version 7 allows administrators to apply policies to Torpark client traffic to block it and regain control over usage.

Cymphonix, Bandwidth Shaping, Bandwidth Management leader, today announced the ability to block Torpark client usage in its upcoming Network Composer Version 7. With the creation of a signature for the newl...


Keywords:
Bandwidth Management,Network Appliance,Bandwidth Shaping


Article Body:
Torpark signature and ability to block anonymous proxies give network administrators greater control over their Internet data stream.  Network Composer Version 7 allows administrators to apply policies to Torpark client traffic to block it and regain control over usage.

Cymphonix, Bandwidth Shaping, Bandwidth Management leader, today announced the ability to block Torpark client usage in its upcoming Network Composer Version 7. With the creation of a signature for the newly developed Torpark Web browser that allows users to surf the Internet anonymously and the ability to block the usage of anonymous proxies, Cymphonix is giving IT administrators greater control over their network resources and the content being viewed.

With Torpark, an individual can download the application onto a USB thumb drive, and by plugging it into the USB port of any computer, create an encrypted tunnel from the computer that allows the user to surf the Internet anonymously. While Torpark is a tool for people who want to surf the Internet anonymously in public places, the application can be problematic to a business because it can bypass Internet filtering policies and invite unwanted traffic and content into the organization's network.

Network Composer Version 7 allows administrators to apply policies to Torpark client traffic to block it and regain control over usage. Policies can be applied to a single user, a group of users or an entire organization and can include different usage rules based on time of day. As an individual attempts to connect using Torpark, Network Composer can block the traffic regardless of the way the client is used - running Torpark on a USB drive, CD or even installed on a host machine.

"Torpark gives users the ability to access the Internet anonymously in public places, but can be detrimental in a corporate environment," said Kevin Santiago, Cymphonix CEO. "By adding Torpark to Network Composer's signature base, we are providing network administrators greater control over their organization's network and the use of their resources."

The Torpark signature will be available in Network Composer Version 7 along with Anonymous Proxy Guard, which prevents the use of anonymous proxy sites that allow employees to bypass filters and monitoring tools. 

Cymphonix Network Composer Version 7 is available only at Cymphonix and its channel partners. Customers with current annual software maintenance agreements will be able to download the software for no additional charge.

Cymphonix Corporation, headquartered in Sandy, Utah, uses patent-pending Cross-Layer Intelligence  technology to provide unmatched network threat protection and resource optimization. With the powerful XLi engine, Cymphonix products seamlessly integrate network protection, application performance, and traffic visibility into a single, easily managed solution. Leading the Cymphonix product line is Network Composer, a smart gateway appliance that helps organizations understand at a glance who is abusing network resources and with what applications - enabling problems to be corrected instantly through a clear, easy-to-manage interface.