Skip to content

Protection & Remediation

Configure settings that can block or allow files, applications, or websites, isolate devices to stop attacks spreading, and prevent data loss.

  • Allow & Block


    Block files, apps, or websites, automatically isolate unsafe devices, and block compromised IP addresses.

    Allow & Block

  • Web Settings


    Decrypt secure email to check it's safe, and use custom filters to control the websites your users can see.

    Web Settings

  • Data Loss Prevention


    Set rules to control the files that your users can transfer.

    Data Loss Prevention

  • Synchronized Security


    Automatically block devices that send spam or viruses, and reject connections from devices that may be unsafe.

    Synchronized Security

  • Linux Profiles


    Use run-time detection profiles to customize rules and allow lists used in policies for Linux devices.

    Linux Profiles