The PIX uses cut-through proxy methodology to improve the process of user verification.

It has the ability to permit or deny TCP and UDP-based applications through the firewall, eliminating both the performance and price impact that occurs with UNIX-based firewall applications.