Statements (68)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:port
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Sonic_WALL
gptkb:Fortinet |
gptkbp:analyzes |
Encrypted Traffic
|
gptkbp:can_provide |
Threat Mitigation
Network Segmentation User Activity Monitoring Real-Time Threat Detection |
gptkbp:deployment |
Data Centers
Cloud Environments |
gptkbp:developed_by |
Cybersecurity Companies
|
gptkbp:enables |
User Identity Management
|
gptkbp:facilitates |
Secure Application Delivery
|
https://www.w3.org/2000/01/rdf-schema#label |
Next-Generation Firewalls
|
gptkbp:includes |
gptkb:physicist
gptkb:Advanced_Malware_Protection |
gptkbp:integrates_with |
gptkb:concert_tour
Endpoint Security Solutions |
gptkbp:is_available_in |
Hardware Form Factor
Software Form Factor |
gptkbp:is_capable_of |
Traffic Shaping
|
gptkbp:is_compatible_with |
Third-Party Security Tools
|
gptkbp:is_critical_for |
Incident Response
Regulatory Compliance |
gptkbp:is_designed_for |
gptkb:software
|
gptkbp:is_designed_to |
Protect Against Advanced Threats
|
gptkbp:is_enhanced_by |
gptkb:software_framework
Threat Hunting Tools |
gptkbp:is_essential_for |
Business Continuity
Modern Cyber Defense |
gptkbp:is_evaluated_by |
Security Analysts
|
gptkbp:is_integrated_with |
Cloud Access Security Brokers (CASB)
Identity and Access Management (IAM) Solutions |
gptkbp:is_often_compared_to |
Traditional Firewalls
|
gptkbp:is_part_of |
gptkb:Company
gptkb:television_channel gptkb:software Unified Threat Management (UTM) |
gptkbp:is_used_by |
Enterprises
|
gptkbp:is_used_for |
Compliance Requirements
Secure Remote Access Mitigate Insider Threats Enforce Security Policies |
gptkbp:is_used_in |
Hybrid Cloud Environments
|
gptkbp:is_used_to |
Prevent Data Breaches
Control Network Traffic Secure Io T Devices |
gptkbp:key |
gptkb:software
|
gptkbp:managed_by |
Web Interface
Centralized Management Console |
gptkbp:offers |
VPN Support
|
gptkbp:provides |
Logging and Reporting
URL Filtering Deep Packet Inspection Policy-Based Control |
gptkbp:recognizes |
Zero-Day Attacks
|
gptkbp:setting |
High Availability
Content Filtering Custom Rules |
gptkbp:supports |
gptkb:van
Virtualization Multi-Tenancy Application Awareness Network Visibility Network Forensics I Pv6 |
gptkbp:utilizes |
gptkb:software
|