Dynamic Address Groups
Multiple tags representing virtual machine attributes, such as IP address and operating system, can be resolved within a Dynamic Address Group, allowing you to easily apply policies to virtual machines, as they are created or travel across the network, without administrative intervention.
Application Visibility
IP addresses and port numbers are useful for network devices but tell you nothing about what is on the network. Knowledge of the applications, users and content traversing the network provides an organization with the power to quickly determine the associated risks and quickly respond. Leveraging the rich context provided by our premium firewall, the visualization, analysis and reporting tools, allow an administrator to quickly learn more about network activity and analyze incidents from a current or comparative perspective.
Data Filtering
Feature-level control, file blocking by type, and data filtering features allow organizations to implement a range of policies that can help balance the use of personal or non-work related applications with the business and security risks associated with unauthorized file and data transfer.
Decryption
Take control over the use of encryption over the network and ensure that it is not being used to conceal unwanted activity or dangerous content. Using policy-based decryption and inspection, administrators can ensure that SSL and SSH are being used for business purposes as opposed to propagation of threats or unauthorized data transfer. The WHOA premium cloud-based firewall can ensure that SSL/SSH sessions are inspected in a safe and secure manner.
Policy Control
The increased visibility into applications, users, and content can help simplify the task of determining which applications are traversing the network, who is using them, and the potential security risk. Armed with these data points, administrators can apply secure enablement policies with a range of responses that are more fine-grained than the traditional allow or deny.