We have helped over 4000 organizations ensure that their critical applications work as needed. Our customers are able to optimize resources so that their key apps meet the expected needs of their users – while ensuring that the rest of the traffic doesn’t impact day-to-day business. The trouble is that new applications keep popping up.

Users are constantly on the hunt for new applications, whether for work (i.e. Shadow IT) or personal, to improve and enrich their lives. The challenge is that these applications require resources, and in some cases a lot of them, which can adversely impact the behavior of business critical apps.

YOU MIGHT ALSO LIKE: Shadow IT: You Can’t Manage What You Can’t See

This is where Exinda’s vast collection of layer 7 signatures come in handy. Exinda’s collection consists of 2500 signatures and over 650 application definitions that are constantly being updated. New applications are frequently being added to the collection too, but just in case we missed something it’s really easy to create your own application definitions based on L3 and L4 information within the Exinda software.

BitTorrent Signatures

One of the real advantages of Exinda is that we have ability to automatically detect and report on new applications as they pop up on the network, without the admin having to change or re-work policies. For network administrators this takes the guesswork out and allows them to receive alerts to changes in application behavior before they start to adversely affect the network. As soon as a new application that has never been seen before shows up in the top usage, our recommendation engine allows them to immediately capture this change so they can configure appropriate shaping policies to mitigate the issues introduced by this new app. In the following example, Exinda has identified several applications positioned in the top usage such as Windows Updates (usually pointing to Windows Updates available during the present week), Spotify and iTunes (social networking & recreational traffic):


Other applications that create grief in organizations, specifically in the Education market, are those implementing anonymous proxy software to prevent firewall detection and blocking when browsing non-allowed content. TOR, BitTorrent and Ultrasurf are some common examples. Apart from the fact that these signatures are included in our detection mechanism, Exinda also provides users with a general “Anonymous Proxy” definition that is maintained in a regular basis with updates on the newest web-based pages with anonymous proxy capabilities.

Exinda’s complete set of application signatures, its shaping capabilities and its Recommendation Engine are the tools needed by network administrators and IT professionals to keep track of any new application and mitigate it’s impact before it affects user experience in their organization.

It’s all about making sure that you get ahead of new traffic before it becomes a problem.

Learn More

Need help keeping tabs on Shadow IT and recreational traffic? We can help! Contact an Exinda Solution Expert for more info.