User and application context and SSL decryption are basic features of our next-generation firewalls, allowing our threat prevention technologies to inspect and stop threats hiding within them. You’re also able to view threat logs within the context of applications and users, so you can fully understand the risks posed by specific applications.
There are several stages within an attack that must be completed before it’s successful. Our protections are coordinated across multiple stages within the attack lifecycle preventing a wide variety of threats, including vulnerability exploit, malware and botnets. If a zero-day component is used, our Threat Prevention technology can still block subsequent stages, maximizing your ability to prevent attacks.
Our threat scanning technology leverages our single-pass scanning architecture (SP3), so traffic is only scanned once, even with all Threat Prevention features enabled (i.e., application control, IPS, anti-malware, command and control protection). Our method of traffic inspection means you get a complete view of an attack across different security controls, and you don’t sacrifice performance for security.