- 
			Informasjon
			
- Identifies the application, regardless of port, SSL/SSH encryption, or evasive technique employed
 - Uses the application as the basis for all your safe enablement policy decisions
 - Categorizes unidentified applications for policy control, threat forensics, or App-ID technology development
 - Enforces security policies for any user, anywhere
 - Blocks a range of known threats - including exploits, malware, spyware, and command and control - across all ports
 - Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
 - Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
 
 - 
			Spesifikasjon
			
 - 
			Nedlastbare filer