1.2. Who uses Zorp?

The protection provided by the Zorp application-level perimeter defense technology satisfies even the highest security needs. The typical users of Zorp come from the governmental, financial, and telecommunication sectors, including industrial companies as well. Zorp is especially useful in the following situations:

  • to protect networks that handle sensitive data or provide critical business processes

  • to solve unique, specialized IT security problems

  • to filter encrypted channels (for example, HTTPS, POP3S, IMAPS, SMTPS, FTPS, SFTP, and so on)

  • to perform centralized content filtering (virus and spam) even in encrypted channels

  • to filter specialized protocols (for example, Radius, SIP, SOAP, SOCKS, MS RPC, VNC, RDP, and so on)