For all apps, users and content | Encrypted traffic | Credentials, identity, and host profile
Enable business apps | Block “bad” apps | Limit app functions | Limit file types | Block websites
Malware | Exploits | Command & control | Malicious websites | Bad domains | Credential theft
Dynamic analysis | Static analysis | Machine learning | Attacker techniques | Analytics | Anomaly/behavior
Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and cost.