File Reputation/File Filtering
Blocking files or defined file extensions of dubious origin.
Alerts and Events
Notification of major technical events or improper software setup.
Bandwidth Control
Allocating different bandwidth to selected online traffic.
User-Based Policy
Customisable policies based on actual users (e.g. different for management, operational staff, etc).
Traffic Prioritisation
Giving priority to defined traffic (e.g. Office 365 over YouTube) to ensure a smooth user experience.
Encrypted Inspection
Inspection of encrypted traffic to have comprehensive insight.
AD Integration
Synchronisation with the customer's Active Directory for the purpose of setting up user-based
Auditing
Receiving the management logs of the cloud firewall.