Access Policy
The Access Policy has these features:
• Firewall - Makes sure that only allowed traffic enters the
company's network. Other traffic is blocked before it
enters.
• Application Control and URL Filtering - Makes sure that
only authorized applications are used on the network and
only allowed websites can be accessed.
• User Awareness - Lets you define policies for individual
users.
• Quality of Service (QoS) - Enables bandwidth control and
lets you give priority to your most important traffic.
Threat Prevention
The Threat Prevention policy has these features:
• Intrusion Prevention System (IPS) - Blocks attempts to
exploit known vulnerabilities in files and network protocols.
• Anti-Virus - Blocks malware, such as viruses and worms,
before it can get into the network.
• Anti-Spam - Blocks spam.
• Anti-Bot - Detects bot-infected machines and blocks bot
Command and Control (C&C) communications.
• Threat Emulation - Protects networks against unknown
threats in files that are downloaded from the internet or
attached to emails.