Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Web Security 866-MxToolBox [email protected] Overview With up to 85% of malware now distributed via the Web, proactive Web security is a necessity. Malware can bring your productivity, and your business to a screeching halt. Webroot® Web Security Service provides better manageability and better malware protection than on-premise solutions. Organizations can get the most advanced protection against viruses, spyware, phishing and data loss while easily enforcing Internet acceptable use policy—all without the hassle of purchasing and managing additional hardware and software. Webroot® Web Security Service Features With the proliferation of email defense products in use, many sources of online threats have shifted their attention from launching attacks through email systems and have targeted web browsers as an often unguarded entryway into a network. In order to be able to offer protection against these threats, we have partnered with Webroot and are now offering Webroot Web Security to defend this largely overlooked gateway to your network. Rapid Deployment and Reduced Cost • Deploy across all seats on your network in minutes • Save money by eliminating hardware and software purchases • Accelerate policy creation through pre-configured policy options based on desired level of security and user Internet access • Conserve IT resources with proactive web security managed by Webroot • Demonstrate ROI with detailed performance reports and statistics Fast Browsing with Minimal Latency • Guarantee user performance via Webroot’s Distributed Global Datacenter Network consisting of multi-tenant and fully redundant regional datacenters along with Webroot’s industry leading service level agreements (SLAs) • Ensure rapid response time with Global Server Load Balancing (GSLB), a unique traffic routing capability that leverages Webroot’s distributed architecture and routes user web traffic through the nearest datacenter to minimize latency • Maintain a fast browsing experience with Webroot’s unique web content download acceleration and proprietary highperformance proxies • Process web traffic in real-time with parallel web traffic analysis to ensure rapid detection of traffic anomalies as well as immediate compliance with company Internet use policies 866-MxToolBox Page 1 of 2 [email protected] Customized End-user Policy Management • Instantly apply Internet access policies to individual users or groups, with new policies and changes activated within 5 seconds • Set end-user quotas based on time spent online, sites accessed and bandwidth consumed • Inform users of company Internet acceptable use policy by customizing ‘Blocked’ and ‘Coached’ access pages • Enforce policies even when users attempt to circumvent them via proxy bypass sites • Easily populate group- and user-level settings by using LDAP to retrieve data from existing company directories • Transparently authenticate and apply policies to individual users on Citrix and Terminal Service environments Seamless Authentication and Protection for Roaming Users • Seamlessly extend acceptable use policies to roaming users via the widest range of authentication methods, including transparent authentication via Webroot’s Desktop Web Proxy (DWP), manual log-in, and SAML SSO • Advanced hotspot management for roaming users providing automatic and seamless authentication to the web security service • Guarantee proactive protection against malware and web threats, no matter where an employee is working • Save company bandwidth and network resources by enabling authenticated roaming users to route traffic to the service rather than establishing a VPN connection back to the corporate network • Integrated component of service. No hardware or software required Real-time Reporting and Web Activity Logging • Monitor and control Internet use with a web-based management portal and summary dashboard • Gain visibility into corporate Internet use with real-time log data compiled across all domains - access up to one year of historical data • Generate timely, accurate Web traffic reports based on thousands of possible charts including top URLs, top URL categories, bandwidth used and blocked malware • Reports can be broken down by account, group or individual user • Continuously monitor Internet use by scheduling daily, weekly or monthly reports Real-Time Phishing Detection • Protect sensitive corporate data with real-time phishing detection • Block even the newest phishing sites with advanced heuristics • Prevent end-user infections by inspecting downloaded JavaScript and shellcode in real time URL Filtering and Content-based Web Filtering • Enforce acceptable use policy with powerful URL filtering and web content filtering • Simplify policy enforcement by blocking websites in nearly 100 preset categories such as gambling, alcohol or pornography • Improve bandwidth and reduce costs by blocking the receipt of large Web files or streaming video • Create customized URL ‘Allow’ and ‘Deny’ lists for even greater filtering control • Ensure a fast browsing experience with distributed global datacenters and unique web content download acceleration Proactive Scan Ahead and Safe Search Capabilities • Ensure safe searching with Scan Ahead, a unique feature that color-codes search engine results to inform users whether sites are allowed, blocked or potentially contain malware • Prevent network infections by automatically blocking sites containing malware • Protect users from exposure to questionable content by removing inappropriate thumbnail images from search engine results 866-MxToolBox Page 2 of 2 [email protected]