SAFE Capability Icons-Mini

SAFE Capability Icons-Mini


Access Control Using TrustSec

Access Control Using Trust Sec

Analysis/Correlation

Analysis Correlation

Anomaly Detection

Anomaly Detection

Anti-Malware

Anti Malware

Anti-Spam

Anti Spam

Anti-Virus

Anti Virus

Application

Application

Application Visibility Control (AVC)

Application Visibility Control ( AV C)

Client Based Security

Client Based Security

Cloud Web Security

Cloud Web Security

Conference Bridge

Conference Bridge

Data Loss Prevention (DLP)

Data Loss Prevention ( DL P)

Database

Database

Distributed Denial of Service Protection

Distributed Denial of Service Protection

DNS

DNS

Email Encryption

Email Encryption

Email Security

Email Security

Fabric Switching

Fabric Switching

Firewall

Firewall

Flow Analytics

Flow Analytics

Identity Authorization

Identity Authorization

Identity Authorization (ALT)

Identity Authorization ( AL T)

Intrusion Detection

Intrusion Detection

Intrusion Prevention

Intrusion Prevention

L2 Switching

L 2 Switching

L2/L3 Network

L 2 L 3 Network

L2/L3 Network Virtual

L 2 L 3 Network Virtual

L3 Switching

L 3 Switching

Load Balancer

Load Balancer

Logging/Reporting

Logging Reporting

Malware Sandbox

Malware Sandbox

Mobile Device Management (MDM)

Mobile Device Management ( MD M)

Monitoring

Monitoring

Policy/Configuration

Policy Configuration

Posture Assessment

Posture Assessment

Routing

Routing

Server Based Security

Server Based Security

SSL/TLS Offload

SS L TL S Offload

Storage

Storage

Threat Intelligence

Threat Intelligence

Time Synchronization

Time Synchronization

User

User

Video

Video

Virtual Firewall

Virtual Firewall

Virtual L2 switching

Virtual L 2 switching

Virtual Private Network (VPN)

Virtual Private Network ( VP N)

Virtualized Capability

Virtualized Capability

Voice

Voice

VPN Concentrator

VP N Concentrator

Vulnerability Management

Vulnerability Management

Web Application Firewall

Web Application Firewall

Web Reputation/Filtering/DCS

Web Reputation Filtering DCS

Web Security

Web Security

Wireless Connection

Wireless Connection

Wireless Intrusion Detection System (WIDS)

Wireless Intrusion Detection System ( WID S)

Wireless Intrusion Prevention System (WIPS)

Wireless Intrusion Prevention System ( WIP S)