Which IPS feature models worm behavior and correlates the specific time between events, network behavior and multiple exploit behavior to more accurately identify and stop worms?
which one uses content scanning to identify sensitive content and controls the transfer of sensitive content…?
which Cisco ASA’s Unified Communications proxy feature manipulates both the signaling and the media channels?
which additional security control can be used to force an attacker to compromise the exposed server before the attacker attempts to penetrate the more protected domains?