Internet Traffic Shaping
Peer to Peer file sharing and unauthorized downloads of music and videos by users can bring your network to a screeching halt. Let Wanaport implement state of the art Internet Traffic Shaping technology to limit unauthorized downloads of music, videos or adult content through Peer to Peer websites. Online gaming consoles can also degrade network performance. Allocate your property’s precious bandwidth to hotel guests needing to download large business files and documents.
How does Internet Traffic Shaping Work?
Wanaport performs these following tasks on your network traffic:
- Monitors ALL traffic; a layer 7 solution covers all ports and protocols.
- Discovers and valuates traffic; analytics and reports help categorize applications, content, users and devices.
- Sets policies on traffic values; blocks inappropriate traffic and prioritizes recreational, relevant and critical traffic
The result? Network performance improves!
What are the four types of internet traffic on your guest based network?
Consists of unwanted traffic, content or users that must be blocked, including web based threats. Common examples: malware, pornography, violence, P2P Applications, unauthorized mobile devices, etc.
Consists of the “everything else” traffic, content, and users that don’t cause alarms, but that aren’t important to organizational success. Common examples: streaming media, iCloud, Dropbox.com, Spotify, Facebook, BYOD, etc.
Consists of business operations traffic, content, and business software and services, often found on Cloud or otherwise hosted environments. Common examples: CRMs, Skype, GoToMeeting.com, connected equipment (copiers, postal machines, etc.), UPS.com, etc.
Consists of traffic, content, and users that affect revenue production, management and that fundamentally depend on a high performing Internet. Common examples: hosted billing systems, Cloud-Based ERPs, order fulfillment systems, etc.