-
Informasjon
- Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
- Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
- Categorizes unidentified applications for policy control, threat forensics or App-ID application identification technology development
- Deploys consistent policies to local and remote users running on the Windows; Apple Mac OS X, macOS and iOS; Linux; and Android platforms
- Enables agentless integration with Microsoft Active Directory and Terminal Services, LDAP, Novell eDirectory and Citrix
- Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
- Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
-
Spesifikasjon
-
Nedlastbare filer