Application control is being used to control Internet applications such as IM tools, gaming clients, P2P downloading clients … etc. First, IAM will identify application via application identification rules. Each identification rule represents one application signature. When traffic travel through IAM, IAM will detect the connection, scan for the application signature and categorize the application accordingly.
IAM accommodates over 1300 application rules across 25 categorizes including streaming media, file transfer, game, download tools, mail, net meeting, OA, database, proxy tool … etc. Controls over the applications can be rather flexible based on activity, schedule, user … etc.