Classifies all applications, on all ports, all the time
.Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed
.Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping
.Categorizes unidentified applications for policy control, threat forensics or App-ID™ application identification technology development
Enforces security policies for any user, at any location
.Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android™ or Apple® iOS platforms
.Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®
.Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information