IPS uses continually updated signatures to scan traffic on all major protocols to provide real-time protection against network threats, including spy-ware, SQL injections, cross-site scripting, and buffer overflows.
REPUTATION ENABLED DEFENSE SERVICE (RED)
A powerful, cloud-based reputation lookup service that protects web users from malicious sites and botnets, while dramatically improving web-processing overhead.
Real-time spam detection for protection from outbreaks. Our spamBlocker is so fast and effective, it can review up to 4 billion messages per day
GATEWAY ANTIVIRUS (GAV)
Leverage our continuously updated signatures to identify and block known spyware, viruses, trojans, worms, rogueware and blended threats – including new variants of known viruses. At the same time, heuristic analysis tracks down suspicious data constructions and actions to make sure unknown viruses don’t slip by..
WEBBLOCKER URL FILTERING
In addition to automatically blocking known malicious sites, WebBlocker’s granular content and URL filtering tools enable you to block inappro-priate content, conserve network bandwidth, and increase employee productivity..
APT Blocker uses an award-winning next-gen sandbox to detect and stop the most sophisticated attacks including ransomware, zero day threats and other advanced malware.
DATA LOSS PREVENTION (DLP)
This service prevents accidental or malicious data loss by scanning text and common file types to detect sensitive informa-tion attempting to leave the network..
Access Portal provides central location for access to cloud-hosted applications, and secure, clientless access to inter-nal resources with RDP and SSH.
Dimension translates data collected from all appliances across your network into actionable network and threat intelligence. Dimension Command gives you the power to take action to mitigate those threats instantly, from one central console..
THREAT DETECTION AND RESPONSE
Correlate network and endpoint security events with enter-prise-grade threat intelligence to detect, prioritize and enable immediate action to stop malware attacks. Improve visibility by evolving your existing security model to extend past prevention, to now include correlation, detection and response.