-
Informasjon
- Identifies the application, regardless of port, SSL/SSH encryption, or evasive technique employed
- Uses the application as the basis for all your safe enablement policy decisions
- Categorizes unidentified applications for policy control, threat forensics, or App-ID technology development
- Enforces security policies for any user, anywhere
- Blocks a range of known threats - including exploits, malware, spyware, and command and control - across all ports
- Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
- Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
-
Spesifikasjon
-
Nedlastbare filer