Protection & Remediation
Configure settings that can block or allow files, applications, or websites, isolate devices to stop attacks spreading, and prevent data loss.
-
Allow & Block
Block files, apps, or websites, automatically isolate unsafe devices, and block compromised IP addresses.
-
Web Settings
Decrypt secure email to check it's safe, and use custom filters to control the websites your users can see.
-
Data Loss Prevention
Set rules to control the files that your users can transfer.
-
Synchronized Security
Automatically block devices that send spam or viruses, and reject connections from devices that may be unsafe.
-
Linux Profiles
Use run-time detection profiles to customize rules and allow lists used in policies for Linux devices.