Classifies all applications, on all ports, all the time
• Identifies the application, regardless of port, encryption (SSL or SSH) or evasive technique
employed.
• Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping.
• Categorizes unidentified applications for policy control, threat forensics or App-ID™ technology
development.
Enforces security policies for any user, at any location
• Deploys consistent policies to local and remote
users running on the Windows ® , Mac ® OS X ® ,
macOS ® , Linux, Android ® or Apple ® iOS platforms.• Enables agentless integration with Microsoft ®
Active Directory ® and Terminal Services, LDAP, Novell ® eDirectory™ and Citrix ® .
• Easily integrates your firewall policies with 802.1X wireless, proxies, network access control solutions and any other source of user identity information.
Prevents known and unknown threats
• Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless
of common evasion tactics employed.
• Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related
web surfing.
• Identifies unknown malware, analyzes it based
on hundreds of malicious behaviors, and then
automatically creates and delivers protection.
Performance and Capacities PA-220
Firewall throughput (App-ID enabled) 1, 3 500 Mbps
Threat Prevention throughput 2, 3 150 Mbps
IPsec VPN throughput 1, 3 100 Mbps
New sessions per second 4 4,200
Max sessions 64,000
Downliad pa-220r.pdf
[ add comment ] ( 30 views ) | permalink | print article | related link | ( 3 / 352 )