Web Security (as-a-Service)

Published on June 2016 | Categories: Types, Brochures | Downloads: 32 | Comments: 0 | Views: 207
of 2
Download PDF   Embed   Report

With Incognito Web Security, you receive the same level of security and protection wherever your users are — at the office, home or anywhere in the world. This has a unique advantage for IT Managers: the ability to maintain and control the same level of internet protection no matter where your users are.

Comments

Content

datasheet

incognito security services

Web Security

Continuous Web Protection. Wherever you are.
With a reported 40,000 new malware samples a day, you need continuous protection when you surf the web against malware, phishing and trojans. Especially when you’re constantly on the move. With Incognito Web Security, you receive the same level of security and protection wherever your users are — at the office, home or anywhere in the world. This has a unique advantage for IT Managers: the ability to maintain and control the same level of internet protection no matter where your users are. For in-house users, integrate with existing infrastructure, including any proxies, seamlessly. Roaming users — whether at home, a hotel or an internet cafe — simply plug into the internet connection where they are and continue browsing, without the need for expensive VPN technology. Since no additional hardware or expensive software license is required, you save time and money. • 99.999% service availability guaranteed • Filter using 12 main categories, 96 subcategories of websites • Proactive Safe-Searching with all major search engines • Automatic updates to scan dbs and client desktop proxies • Customized URL ‘Allow’ and ‘Deny’ lists

Quick Wins
• • • • • • • • • Award-winning real-time malware, virus and spam scanning engines Equal protection for the entire organization, multiple offices and roaming users Fast browsing with minimal latency Proactive Safe-Search Technology Rapid deployments with support for Terminal Services, Citrix Service Availability Guaranteed by SLAs Meet industry & regulatory compliance requirements Lower Total Costs of Ownership (TCO) No hardware required

Independence from variables
As always, the service is independent of your architecture, operating systems, applications, protocols or location of your users. It just works. For more information or a free trial, reach out to us: e-mail [email protected] twitter @cognitoit skype cognitoit

cognito

datasheet

Web Security

Customer Environment

Webroot Global Data Center Network
Webroot Security Service
Threat Protection
ANTIVIRUS ANTISPYWARE

Policy Enforcement
WEB ACCESS CONTROL MOBILE USER PROTECTON

WEB TRAFFIC

ANTIPHISHING

Data Security
CONTENT FILTERING/DLP APP CONTROL

Compliance
POLICY ENGINE USER REPORTING/ LOGGING

Internet

Award-winning technology to Threat protection protect your infrastructure antivirus, antispyware, and antiphishing
Powered by Web Securityaward-winning HTTP and FTP over Webroot Webroot’s Service scans all Anti-spyware HTTP requests in the cloud, blocking malware before it ever engine, Spy Sweeper, Incognito Web Security Service reaches your FTP over HTTP requests in the scans all HTTP, network. We guarantee defense against 100% of known malware, and blocking threats before they cloud, filtering out andmultiple zero-hour heuristic filters protect against infrastructure. Multiple Antispyware protection reach your new and unknown variants. zero-hour heuristic is powered by the industry’s leading filters protect against known and antispyware engine, Webroot new variants, with Spy Sweeper, which protects millions of desktops worldwide. guarantees against 100% of known malware.
Antiphishing detection uses advanced heuristics to identify phishing sites in real time, ensuring sensitive personal and corporate data remains secure.

New! vulnerability Scanning and Spyware detection
Reduce risk by identifying holes in your security before attackers do. Exclusively offered by Webroot Web Security Service, this powerful feature eliminates the need to purchase and manage a separate vulnerability scanner. You can scan endpoints directly from Webroot’s Desktop Web Proxy (DWP) to identify known system vulnerabilities, including operating systems, browser versions, and other installed software, as well as spyware infections. View results within the Management Portal to facilitate remediation.

Website URL, Content-based Web filtering
Filter web content based on URL, web application, attachment type, MIME type, file types and file sizes. Easily enforce internet use policies, protect users from inappropriate content and block advertisements. Advanced controls allow you to filter by category or specific domains, and apply ‘Allowed’, ‘Blocked’ or ‘Coached’ Access to websites.
The Phileas® research system scans the Web for threats

proactive Safe Searching capabilities
Webroot provides a unique “Scan Ahead” technology that examines all search engine queries and returns color-coded ADDsearch page results based on the requestor’s Internet access ON policy. This feature not only helps enforce Internet use policy, Protect it also proactively they reach yourthreats and harmful but e-mails before mitigates Internet network. content. filtered with high-intensity to inappropriate content, E-mails are To protect users from exposurescanners inappropriate thumbnail images & blocked from search engine providing multiple layers of virusare spam scans. With results by enforcing e-mail encyrption, in search engines. powerful add-ons likethe Safe Search feature your mail is

E-mail Security

Inform users of Web policies and potential threats with color-coded search results

completely protected from data leakage.

cogn o
support [email protected] twitter.com/c_noc skype c_noc information www.cognitoit.com blog.cognitoit.com cognitoit.com/news.html contact [email protected] twitter.com/cognitoit skype cognitoit

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close