·Built-in SSL traffic check: more and more sophisticated targeted attacks use encryption to avoid detection. The built-in SSL traffic check can reduce the security blind spots caused by encrypted traffic.
Efficiency scalability: With the continuous improvement of data center system integration rate and the increasing popularity of cloud environment, the protection solution must be able to expand with the growth of network demand. High-capacity network provides unmatched protection and efficiency.
·Flexible authorization mode: Easily expand the performance and protection requirements, adopt pay-as-you-go and flexible software authorization mode, and can redistribute the authorization of the entire deployment environment without changing the network infrastructure.
·Real-time machine learning: Many information security threats have a short life cycle and are constantly evolving at any time, so the traditional detection mechanism based on feature matching or hash code is often invalidated. The statistical model developed by machine learning technology is used to detect and prevent threats in real time.
Advanced threat analysis: By pre-filtering known threats, and then sending suspicious potential threats to automated sandbox simulation analysis, if it is confirmed as malicious content, it will be immediately corrected.
·Integrated advanced threat protection: It can be integrated with advanced threat detection solutions of trend technology.
High availability: With multiple fault-tolerant functions, it is very suitable for deployment in the path, including: hot-swappable power supply, protection timing device for continuous monitoring of data security and management engine, built-in flow pass-through function, and zero power high availability. In addition, the standby serial connection mode can also be used to provide automatic Active-Active or Active-Passive high availability (HA).
·Top threat intelligence: The digital vaccine laboratory provides top threat analysis and protection filtering rules, covering the entire vulnerability life cycle to prevent all potential attack combinations, rather than simply targeting specific vulnerability attack techniques, to prevent the undisclosed and zero time difference threats.
Asymmetric traffic check: traffic asymmetry is a common condition in enterprise networks and data center networks. Enterprises must overcome the challenge of asymmetric traffic and routing to truly and effectively protect their networks. The default will check all types of traffic, including asymmetric traffic, and apply appropriate protection policies to ensure security.
·Flexibility and flexibility: software defines network protection and deploys intrusion protection in a service manner. In addition, you can protect your virtualized applications from within your virtual infrastructure (VMware, KVM).
·Centralized management: It can provide a unified graphical user interface for policy and element management, centrally monitor all operation information, edit network protection policies, set element configuration, and deploy network protection policies to the entire infrastructure, whether physical or virtual.
·Virtual patching: Virtual patching provides a powerful and scalable first-line defense mechanism, which can prevent the network from being attacked by known threats. It uses vulnerability filtering rules to provide effective protection, and effectively prevent all attacks against specific vulnerabilities at the network level (not the user level). This can help enterprises control the management strategy of patch and update, provide advance protection against the gap between vulnerability discovery and release of patch and update, and provide additional protection for old and discontinued software.
·Wide support for all kinds of traffic: the platform can support all kinds of traffic and communication protocols. It provides IPv6/IPv4 traffic synchronization check and supports related channel protocols. Extensive coverage allows IT and information security system administrators to flexibly deploy defense where necessary.