Features
Top Performing Features
Proxy Server
A proxy server changes your IP address and masks the origin of your network traffic
Category average: 8.3
Identification Technologies
Policy-based visibility and control over applications, users and content
Category average: 8.5
Visualization Tools
Visualization tools present administrators with data on applications traversing the network, who is using them, and the potential security impact.
Category average: 7.7
Content Inspection
Inspecting permitted application traffic by means of threat prevention, URL filtering and data filtering
Category average: 8.4
Firewall
A firewall is a filter that stands between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out
Identification Technologies
Policy-based visibility and control over applications, users and content
Category average: 8.5
Visualization Tools
Visualization tools present administrators with data on applications traversing the network, who is using them, and the potential security impact.
Category average: 7.7
Content Inspection
Inspecting permitted application traffic by means of threat prevention, URL filtering and data filtering
Category average: 8.4
Reporting and Logging
Custom and summary reports, and log files enabling analysis of security incidents, application usage and traffic patterns
Category average: 7.8
Stateful Inspection
Stateful inspection analyzes packet headers and contents of packets
Category average: 8.6
Proxy Server
A proxy server changes your IP address and masks the origin of your network traffic
Category average: 8.3