

Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology developmentĮnforces security policies for any user, at any location.Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed.


Overview: Key Security Features: Classifies all applications, on all ports, all the time
