A continually updated database to identify and block access to sites known to host spyware and viruses. It also detects installed spyware trying to access the Internet.
Scanning and inspecting SSL-encrypted traffic for specific categories and domains enable granular policy enforcement. Administrators can also configure the Web Security Gateway to monitor and archive outbound web application communications like Facebook posts, tweets, and web-based email to a message archiving solution
Administrators can create policies that control user access to 99.7 percent of commonly visited websites using 95 content categories including pornography, violence, hacking, sports, news, dating, shopping, chat, and more. Content filtering policies can be customised to restrict specific websites or look for patterns in web addresses.
Organisations can control online content normally hidden by SSL. This includes content found in social-media platforms, web-based email, and search engines. Administrators can specify domains and URL categories for which SSL-encrypted traffic will be decrypted and scanned for malware and policy. Not only can organisations restrict entire platforms, it’s now possible to enforce granular access for secure websites (e.g., YouTube).
Content filtering and advanced malware protection is offered as a simple all-inclusive subscription without any per-user fees.
Full system emulation, providing deep visibility into malware behaviour. Files are checked against a dynamic cryptographic hash database, and any match is immediately blocked. If a match is not immediately found, or in case the file is unknown, it is delivered to our virtual sandbox for detonation where malicious behaviour can be safely discovered.
An example of this solution in use
We act as a single point of contact for all your technical requirements. Thus, we help you keep your system running effectively, without technical difficulties or network downtime.
Our customer portal enables you to track your support tickets and check on the progress as well as discuss the ticket with the engineer. The support process is designed to be as interactive and as transparent as possible.
Alongside the support process we have a team of technical experts who are each assigned to specific accounts. This enables the customer to have a single point of contact for all support cases and technical questions.