1. Full Layer 7 security protection
2. Stop malicious files with inline prevention
3. Simplify Zero Trust with easy-to-deploy user identity and access
4. Safeguard 5G transformation and multi-access edge computing (MEC)
5. Web Proxy