SAFE Capability Icons

SAFE Capability Icons


Access Control Using TrustSec

Access Control Using Trust Sec

Analysis/Correlation

Analysis/ Correlation

Analysis/Correlation.90

Analysis/ Correlation 90

Anomaly Detection

Anomaly Detection

Anti-Malware

Anti Malware

Anti-Spam

Anti Spam

Anti-Virus

Anti Virus

Application Visibility Control (AVC)

Application Visibility Control ( AV C)

Application Visibility Control (AVC).91

Application Visibility Control ( AV C) 91

Client Based Security

Client Based Security

Cloud Web Security

Cloud Web Security

Data Loss Prevention (DLP)

Data Loss Prevention ( DL P)

Database

Database

Distributed Denial of Service Protection

Distributed Denial of Service Protection

DNS

DNS

Email Encryption

Email Encryption

Email Security

Email Security

Fabric Switching

Fabric Switching

Firewall

Firewall

Flow Analytics

Flow Analytics

Identity Authorization

Identity Authorization

Identity Authorization Alternate

Identity Authorization Alternate

Intrusion Detection

Intrusion Detection

Intrusion Prevention

Intrusion Prevention

L2 Switching

L 2 Switching

L2/L3 Network

L 2/ L 3 Network

L2/L3 Network.64

L 2/ L 3 Network 64

L3 Switching

L 3 Switching

Load Balancer

Load Balancer

Logging/Reporting

Logging/ Reporting

Logging/Reporting.92

Logging/ Reporting 92

Malware Sandbox

Malware Sandbox

Mobile Device Management (MDM)

Mobile Device Management ( MD M)

Monitoring

Monitoring

Monitoring.93

Monitoring 93

Policy/Configuration

Policy/ Configuration

Policy/Configuration.94

Policy/ Configuration 94

Posture Assessment

Posture Assessment

Routing

Routing

Server Based Security

Server Based Security

SSL/TLS Offload

SS L/ TL S Offload

Threat Intelligence

Threat Intelligence

Time Synchronization

Time Synchronization

Video

Video

Virtual L2 Switching

Virtual L 2 Switching

Virtual Private Network(VPN)

Virtual Private Network( VP N)

Virtualized Capabilities

Virtualized Capabilities

Virtualized Firewall

Virtualized Firewall

Voice

Voice

VPN Concentrator

VP N Concentrator

Vulnerability Management

Vulnerability Management

Vulnerability Management.95

Vulnerability Management 95

Web Application Firewall (WAF)

Web Application Firewall ( WA F)

Web Reputation/Filtering/DCS

Web Reputation/ Filtering/ DCS

Web Security

Web Security

Wireless Connection

Wireless Connection

Wireless Intrusion Detection System (WIDS)

Wireless Intrusion Detection System ( WID S)

Wireless Intrusion Prevention System (WIPS)

Wireless Intrusion Prevention System ( WIP S)