Traditionally, security policies were applied based on IP addresses, but the increasingly dynamic nature of users and applications means IP addresses alone have become ineffective as a policy control element for safe application enablement. Our next-generation firewalls integrate with a wide range of enterprise directories and terminal services offerings, enabling you to:

Visibility Into a User’s Application Activity

Visibility into the application activity at a user level, not just at an IP address level, lets you determine patterns of usage along with the associated business and security risks. With a few clicks, you gain visibility into the application bandwidth and session consumption, the associated threats, as well as the source and destination of the application traffic. With this knowledge, you can proactively align application usage with your business requirements.

User-Based Policy Control

Visibility into application usage means you can quickly analyze the role and risk of applications and who is using them, and then translate that information into user-based safe application enablement policies. User-based policy controls can be assembled based on the application, which category and subcategory it belongs in, its underlying technology, or the application characteristics.

User-Based Analysis, Reporting and Forensics

User information is pervasive throughout our firewall feature set – and that includes fine-grained forensic analysis and reporting. You can easily create log filters by clicking on a cell value, which can then be expanded with additional criteria using the expression builder.

You can also generate informative reports on user activities using any one of the many predefined reports, by creating a custom report from scratch, or by modifying a predefined report. Any of the reports – predefined or custom – you can then export to either CSV, PDF or XML, or email on a scheduled basis.