Building Complex Policies
Customers sometime require the ability to control access to application with granularity. For example, a customer may want to allow usage of the standard mobile email client, but block usage of the Outlook mobile application.
When building a policy, the option to limit access can be done based on source IP address, user-agents, device profiles, access method, or user groups. After you define the parameters for access, you can then choose what options you would like to have applied to the traffic. Direct access, DLP, Encryption, watermarking, and combinations thereof are all valid selections.