This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Cloud Edge uses the IPS
pattern file to block IPS vulnerabilities. If a comparison between patterns suggests
that a
network connection has a vulnerability, Cloud Edge proceeds
with the configured action.