Cymphonix to Present Internet Management Solution at Next GroupLink “Cool Success Central” Webinar Series for Schools

Share Article

Scott Myers, Cymphonix sales engineer, will cover the four types of internet traffic and how to fully see and manage them.

Cymphonix has been chosen as one of four presenters in the “Cool Success Central” webinar series hosted by GroupLink Corporation. The webinar series presents innovative technologies from companies like Cymphonix, SUSE Linux, NetIQ, GWAVA, SEP, Novell, and more, and sessions cover best practices for IT professionals.

Held May 22, 2012 from 11:00 a.m. to 3:00 p.m. EDT, the series will also include presentations from SchoolTipLine, GWAVA and Concensus. Topics include: Two-way, Anonymous Incident Reporting, Identify and Control the Four Types of Internet Traffic, Disaster Recovery Solutions, and Identity Management Roles in Education. Attendees can attend all or any of the topics depending on their interest.

The webinar is free of charge, and interested parties are encouraged to register soon as seats are limited. To register, please visit: For more information about Cymphonix, please visit

About Cymphonix
Cymphonix helps organizations get complete clarity into and full control over all their Internet traffic. As demand for content grows exponentially, network administrators’ ability to control and filter content, prioritize traffic and applications, and manage bandwidth is taxed to the extreme. Too often, they must resolve incidences and usage issues by cobbling together information from scattered locations and products. The result? Time and cost-intensive forensics and policy-setting that’s rarely based on a true understanding of the who, what, when, and where associated with the content and traffic flowing over their Internet connection. Cymphonix’s line of network appliances is a single source solution that allows network administrators to quickly, easily and clearly understand down to the minutest detail what’s happening on their connection at any given time, and then easily set and enforce policies across their network. Consequently, they spend less time on incidence response, forensics, and policy enforcement while gaining full control over content, applications, traffic, and bandwidth. For more information, please visit

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Brent Verhaaren
Visit website