NG Firewall | |||||||||||||||||||
Functionalities |
|
|
|
|
|
| N/A |
|
|
|
|
|
|
|
|
| N/A |
|
|
Data Leak Prevention | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
Context-aware policy | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||||
DDOS protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Network behavior analysis support | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Sandboxing support | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
Antivirus and antispyware functions | N/A | N/A | N/A | ||||||||||||||||
IDS/IPS availability | N/A | N/A | N/A | ||||||||||||||||
Bot protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
Application level attacks protection (Application Intelligence) | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||||
Two-factor authentication (2FA) | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Certificates based authentication | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Available proxy modes |
| N/A |
|
| N/A | N/A | N/A |
|
| N/A |
|
|
|
|
|
| N/A |
|
|
Management |
| N/A |
|
| N/A |
| N/A |
|
|
|
|
|
|
|
|
| N/A |
|
|
Deployment options |
|
|
|
|
|
| N/A |
|
|
|
|
|
|
|
|
| N/A |
| N/A |
Integrations |
| N/A |
|
| N/A |
|
|
|
| N/A |
|
|
|
|
|
| N/A |
| N/A |
OS and hardware | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
NG Firewall |
Functionalities |
Data Leak Prevention |
Context-aware policy |
DDOS protection |
Network behavior analysis support |
Sandboxing support |
Antivirus and antispyware functions |
IDS/IPS availability |
Bot protection |
Application level attacks protection (Application Intelligence) |
Two-factor authentication (2FA) |
Certificates based authentication |
Available proxy modes |
Management |
Deployment options |
Integrations |
OS and hardware |