- 
			Informasjon
			
- Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
 - Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
 - Categorizes unidentified applications for policy control, threat forensics or App-ID application identification technology development
 - Deploys consistent policies to local and remote users running on the Windows; Apple Mac OS X, macOS and iOS; Linux; and Android platforms
 - Enables agentless integration with Microsoft Active Directory and Terminal Services, LDAP, Novell eDirectory and Citrix
 - Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information
 - Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed
 - Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing
 - Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection
 
 - 
			Spesifikasjon
			
 - 
			Nedlastbare filer