Adaptive defense 360 provides three basic tools to filter the network traffic that protected computers send or receive:
Protection using system rules: These rules describe communication characteristics (ports, IP addresses, protocols etc.) in order to allow or deny data flows that coincide with the configured rules.
Program protection: Rules that allow or prevent the programs installed on users' computers from communicating.
Intrusion detection system: Detects and rejects malformed traffic patterns that affect the security or performance of protected computers.
Related topics