Related Products
|
||||||
About
With the pervasiveness of mobile devices, the Internet of Things, and 5G, your network has to be ready for what’s next. BIG-IP Policy Enforcement Manager (PEM) is a policy enforcement function that gives you the network flexibility and control you need while delivering a reliable customer experience. Implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns, then use BIG-IP PEM to enforce those plans and services. Ultimately, your customers need your network to be fast, reliable, and available. Through smarter traffic steering, more sophisticated policy management, and improvements in network functions, BIG-IP PEM leads to happier customers. And because happy customers are stickier customers, you’ll see reduced churn and better revenue.
|
About
odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT departments interested in a solution to improve network performance through effective policy management
|
Audience
Enterprise organizations that need a powerful malware prevention and content disarm and reconstruction (CDR) solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationF5
Founded: 1996
United States
www.f5.com/products/big-ip-services/policy-enforcement-manager
|
Company Informationodix
Founded: 2009
United States
www.odi-x.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Integrations
Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
PwC Amplifier
|
Integrations
Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
PwC Amplifier
|
|||||
|
|
|