Infinity Threat Prevention Profiles

These are the 5 profiles supported by Infinity Threat Prevention:

  • Recommended for Perimeter Profile

    Optimized security for perimeter gateway to prevent cyberattacks. Includes protection for users browsing the web, data centers, incoming emails, and FTP. This is the default profile and the recommended profile for multiple protections on the same gateway (for example, when both Perimeter protection and Internal network protection are needed).

    Recommended for Perimeter is the most similar profile to the Optimized profile in the traditional Threat Prevention policy.

  • Strict Security for Perimeter Profile

    Maximum security for perimeter gateways to prevent cyberattacks. Includes protection for users browsing the web, data centers, incoming emails and FTP.

  • Cloud/Data Center Profile

    Optimized security to prevent cyberattacks on data centers. Includes extensive protection over servers and east–west traffic.

  • Internal Network Profile

    Maximum security to prevent cyberattacks over internal traffic between internal users and internal servers.

Each profile consists of a wide range of industry-leading protections. This table summarizes the technologies used by each profile:

 

IPS Protections

File & URL Reputation

ThreatCloud

Sandbox

Sanitization (CDR)

C&C protection

Recommended for Perimeter Profile

Cloud/Data Center Profile

Internal Network Profile

Strict Security for Perimeter Profile

Recommended for Guest Network Profile

Here is a short explanation about each technology: