-
Informasjon
- Safely enable applications, users, and content by classifying all traffic, determining the business use case, and assigning policies to allow and protect access to relevant applications
- Prevent threats by eliminating unwanted applications to reduce your threat footprint and apply targeted security polices to block known vulnerability exploits, viruses, spyware, botnets, and unknown malware
- Protect your datacenters through the validation of applications, isolation of data, control over rogue applications, and high-speed threat prevention
- Secure public and private cloud computing environments with increased visibility and control, deploy, enforce and maintain security policies at the same pace as your virtual machines
- Embrace safe mobile computing by extending the enterprise security platform to users and devices no matter where they are located
-
Spesifikasjon
-
Nedlastbare filer