The Pillars of SDX Security
Our comprehensive security model is built on five key pillars that work together to protect your network.BGP Threat Mitigation
Your first line of defense. Proactively block all traffic to and from known malicious IP addresses (botnets, scanners) using real-time, curated threat intelligence feeds.
DNS Content Filtering
Control what your users can access. Block entire categories of undesirable content and enforce SafeSearch to protect your network from web-based threats and enforce acceptable use policies.
Security Groups (Stateful Firewall)
Define your network’s posture with granular, stateful firewall rules. Create reusable policies to allow specific traffic and deny everything else, applied consistently across all your sites.
Vulnerability Scanning (CVE)
Proactively discover weaknesses from the inside. Schedule automated scans to identify devices on your network with known vulnerabilities (CVEs) and receive AI-powered mitigation advice.
Audit Logs
Gain complete visibility. Maintain an immutable, searchable record of every action taken in your workspace, providing a critical tool for security investigations and compliance.
In This Section
Dive deeper into the features that power your network’s security.DNS Content Filtering
Learn how to create policies to block unwanted web content and enforce SafeSearch.
BGP Threat Mitigation
A guide to using threat intelligence feeds to block malicious IP addresses.
Security Groups
Master the centralized, stateful firewall with reusable Prefix Lists.
Vulnerability Scanning
Set up automated CVE scans and learn how to manage the results.
Audit Logs
Understand how to search and filter your logs for security and compliance.