Q1 - Why should I perform Protocol Optimization in my network?
A1 - By storing frequently accessed objects, Object Caching eliminates the need to repeatedly retrieve unchanged content, allowing users to retrieve content faster while reducing bandwidth. Why waste WAN bandwidth retrieving multiple copies of the same object? When objects are cached, the only traffic that crosses the WAN is permissions checks (when required) and verification checks that ensure that the copy of the object in cache is still “fresh”, or current. As a result, user requests are accelerated considerably, providing a better experience for the user and increasing productivity because users no longer must wait for content to load. For large, compressed, or encrypted files, Object Caching is the only WAN Optimization mechanism that isn’t impeded by the size and inherent randomness of the file content. This includes compressed zip files, condensed pictures, Acrobat files, and multimedia content such as video and audio files. Further, it is completely automatic and transparent and does not require modification of your existing file services, Web site, or video distribution systems.
Q2 - Why should I implement User Management?
A1 - Most security-conscious enterprises today implement some form of authentication and authorization for accessing network resources. The benefits to this approach are clear – user permissions can be verified before granting access to resources, and user activity can be monitored through various logging mechanisms. This solution is not without its limitations however. In typical authentication and authorization deployments, administrators have various options available with regard to how users are authenticated, but have little control over how often users are authenticated. User Management enables administrators to more granularly control the frequency of user authentication, allowing them to ignore cached browser credentials and force the user to re-enter credentials, or to require more frequent authentication only if the user is accessing critical resources. This kind of flexibility allows administrators to implement authentication-based policies that more closely match their network security policies.