Download 866-MxToolBox

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Web Security
866-MxToolBox
[email protected]
Overview
With up to 85% of malware now distributed via the Web, proactive
Web security is a necessity. Malware can bring your productivity,
and your business to a screeching halt. Webroot® Web Security
Service provides better manageability and better malware
protection than on-premise solutions. Organizations can get the
most advanced protection against viruses, spyware, phishing and
data loss while easily enforcing Internet acceptable use policy—all
without the hassle of purchasing and managing additional hardware
and software.
Webroot® Web Security Service Features
With the proliferation of email defense products in use, many
sources of online threats have shifted their attention from launching
attacks through email systems and have targeted web browsers as
an often unguarded entryway into a network.
In order to be able to offer protection against these threats, we
have partnered with Webroot and are now offering Webroot Web
Security to defend this largely overlooked gateway to your network.
Rapid Deployment and Reduced Cost
• Deploy across all seats on your network in minutes
• Save money by eliminating hardware and software purchases
• Accelerate policy creation through pre-configured policy options based on desired level of security and user
Internet access
• Conserve IT resources with proactive web security managed by Webroot
• Demonstrate ROI with detailed performance reports and statistics
Fast Browsing with Minimal Latency
• Guarantee user performance via Webroot’s Distributed Global Datacenter Network consisting of multi-tenant and fully
redundant regional datacenters along with Webroot’s industry leading service level agreements (SLAs)
• Ensure rapid response time with Global Server Load Balancing (GSLB), a unique traffic routing capability that
leverages Webroot’s distributed architecture and routes user web traffic through the nearest datacenter to
minimize latency
• Maintain a fast browsing experience with Webroot’s unique web content download acceleration and proprietary highperformance proxies
• Process web traffic in real-time with parallel web traffic analysis to ensure rapid detection of traffic anomalies as well as
immediate compliance with company Internet use policies
866-MxToolBox
Page 1 of 2
[email protected]
Customized End-user Policy Management
• Instantly apply Internet access policies to individual users or groups, with new policies and changes activated within
5 seconds
• Set end-user quotas based on time spent online, sites accessed and bandwidth consumed
• Inform users of company Internet acceptable use policy by customizing ‘Blocked’ and ‘Coached’ access pages
• Enforce policies even when users attempt to circumvent them via proxy bypass sites
• Easily populate group- and user-level settings by using LDAP to retrieve data from existing company directories
• Transparently authenticate and apply policies to individual users on Citrix and Terminal Service environments
Seamless Authentication and Protection for Roaming Users
• Seamlessly extend acceptable use policies to roaming users via the widest range of authentication methods,
including transparent authentication via Webroot’s Desktop Web Proxy (DWP), manual log-in, and SAML SSO
• Advanced hotspot management for roaming users providing automatic and seamless authentication to the web
security service
• Guarantee proactive protection against malware and web threats, no matter where an employee is working
• Save company bandwidth and network resources by enabling authenticated roaming users to route traffic to the
service rather than establishing a VPN connection back to the corporate network
• Integrated component of service. No hardware or software required
Real-time Reporting and Web Activity Logging
• Monitor and control Internet use with a web-based management portal and summary dashboard
• Gain visibility into corporate Internet use with real-time log data compiled across all domains - access up to one
year of historical data
• Generate timely, accurate Web traffic reports based on thousands of possible charts including top URLs, top URL
categories, bandwidth used and blocked malware
• Reports can be broken down by account, group or individual user
• Continuously monitor Internet use by scheduling daily, weekly or monthly reports
Real-Time Phishing Detection
• Protect sensitive corporate data with real-time phishing detection
• Block even the newest phishing sites with advanced heuristics
• Prevent end-user infections by inspecting downloaded JavaScript and shellcode in real time
URL Filtering and Content-based Web Filtering
• Enforce acceptable use policy with powerful URL filtering and web content filtering
• Simplify policy enforcement by blocking websites in nearly 100 preset categories such as gambling, alcohol
or pornography
• Improve bandwidth and reduce costs by blocking the receipt of large Web files or streaming video
• Create customized URL ‘Allow’ and ‘Deny’ lists for even greater filtering control
• Ensure a fast browsing experience with distributed global datacenters and unique web content
download acceleration
Proactive Scan Ahead and Safe Search Capabilities
• Ensure safe searching with Scan Ahead, a unique feature that color-codes search engine results to inform users
whether sites are allowed, blocked or potentially contain malware
• Prevent network infections by automatically blocking sites containing malware
• Protect users from exposure to questionable content by removing inappropriate thumbnail images from search
engine results
866-MxToolBox
Page 2 of 2
[email protected]