The protection provided by the Zorp application-level perimeter defense technology satisfies even the highest security needs. The typical users of Zorp come from the governmental, financial, and telecommunication sectors, including industrial companies as well. Zorp is especially useful in the following situations:
to protect networks that handle sensitive data or provide critical business processes
to solve unique, specialized IT security problems
to filter encrypted channels (for example, HTTPS, POP3S, IMAPS, SMTPS, FTPS, SFTP, and so on)
to perform centralized content filtering (virus and spam) even in encrypted channels
to filter specialized protocols (for example, Radius, SIP, SOAP, SOCKS, MS RPC, VNC, RDP, and so on)
Published on May 30, 2024
© BalaSys IT Ltd.
Send your comments to support@balasys.hu