Features
Top Performing Features
Policy planning and rule management
Monitor the effectiveness of network security infrastructure
Category average: 8.9
Anomalous Event or Behavior Deviation
Ability to pinpoint unusual events or trends
Category average: 8.6
Firewall Rule Cleanup
Ability to detect and cleanup rules that are either partially or completely unused, expired or shadowed
Category average: 8.9
Automated Policy Orchestration
Automatically brings together all security controls in one place, automates changes and collapses risks
Category average: 7.8
Firewall Security Management
Firewall Security Management Software supports monitoring and configuration of firewalls from a central dashboard
Policy planning and rule management
Monitor the effectiveness of network security infrastructure
Category average: 8.9
Automated Policy Orchestration
Automatically brings together all security controls in one place, automates changes and collapses risks
Category average: 7.8
Device Discovery
Ability to automatically find all devices connected to the network
Category average: 8.2
Policy Compliance Auditing
Automatic identification of gaps in compliance, remediation, and generation of compliance reports for auditors
Category average: 8.2
Attack Path Simulation Testing
Simulation of potential attack paths to expose network exposure
Category average: 7.9
Anomalous Event or Behavior Deviation
Ability to pinpoint unusual events or trends
Category average: 8.6
Vulnerability Scans
Network scans to pinpoint vulnerable locations for remediation
Category average: 8.4
Firewall Rule Cleanup
Ability to detect and cleanup rules that are either partially or completely unused, expired or shadowed
Category average: 8.9