Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Policy Enforcer Overview

    Policy Enforcer provides centralized, integrated management of all your security devices (both physical and virtual), giving you the ability to combine threat intelligence from different solutions and act on that intelligence from one management point.

    Policy Enforcer includes the following:

    • Pervasive Security—Combine security features and intelligence from devices across your network, including switches, routers, firewalls, to create a “Secure Fabric” that leverages information you can use to create policies that address threats in real-time and into the future. With monitoring capabilities, Policy Enforcer can also act as a sensor, providing visibility for intra and inter-network communications.
    • User Intent-Based Policies—Create policies according to logical business structures such as users, user groups, geographical locations, sites, tenants, applications, or threat risks. This allows network devices to share information, resources, threat detection intelligence, and remediation actions within the network.
    • Threat Intelligence Aggregation—Gather threat information from multiple locations and devices, both physical and virtual, as well as third party solutions.

    Using Policy Enforcer and the intelligence feeds it offers, you can create threat prevention policies that provide monitoring and actionable intelligence for threat types such command and control servers, infected hosts, known malware, and Geo IP-based server data.

    Modified: 2016-11-16