+
+

Related Products

  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    120 Ratings
    Visit Website
  • Auvik
    730 Ratings
    Visit Website
  • Proton VPN
    41,009 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Addigy
    261 Ratings
    Visit Website
  • Unimus
    31 Ratings
    Visit Website
  • AdRem NetCrunch
    156 Ratings
    Visit Website
  • HostZealot
    295 Ratings
    Visit Website

About

With the pervasiveness of mobile devices, the Internet of Things, and 5G, your network has to be ready for what’s next. BIG-IP Policy Enforcement Manager (PEM) is a policy enforcement function that gives you the network flexibility and control you need while delivering a reliable customer experience. Implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns, then use BIG-IP PEM to enforce those plans and services. Ultimately, your customers need your network to be fast, reliable, and available. Through smarter traffic steering, more sophisticated policy management, and improvements in network functions, BIG-IP PEM leads to happier customers. And because happy customers are stickier customers, you’ll see reduced churn and better revenue.

About

odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT departments interested in a solution to improve network performance through effective policy management

Audience

Enterprise organizations that need a powerful malware prevention and content disarm and reconstruction (CDR) solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

F5
Founded: 1996
United States
www.f5.com/products/big-ip-services/policy-enforcement-manager

Company Information

odix
Founded: 2009
United States
www.odi-x.com

Alternatives

Alternatives

FileWall

FileWall

Odix
Falcon Sandbox

Falcon Sandbox

CrowdStrike

Categories

Categories

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
PwC Amplifier

Integrations

Active Directory
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
PwC Amplifier
Claim F5 BIG-IP Policy Enforcement Manager and update features and information
Claim F5 BIG-IP Policy Enforcement Manager and update features and information
Claim odix and update features and information
Claim odix and update features and information