network ...we dig deeper. safe & secure smart personalized time-saving professional

Size: px
Start display at page:

Download "network ...we dig deeper. safe & secure smart personalized time-saving professional"

Transcription

1 smart network CYAN security...we dig deeper. safe & secure professional time-saving personalized

2 Hello. We would like to introduce ourselves. your CYAN network We re CYAN Network Security, your partner for proxy technology and Web filtering solutions. Our roots date back more than 15 years, when we created one of the first Web servers and one of the first proxy servers on the market. We soon learned that safe Internet connections are key to business success. From this experience was born our passion for developing solutions for Web security, and the birth of our company, CYAN Network Security. Named after the calming blue-green color that stands for vigilance and reliability, CYAN Network Security reflects these traits in our mission: we create proxy technology and Web filtering solutions that you can depend on for business security and productivity. With our products, you have easy-to-use, flexible tools that you can tailor easily to your specific needs. For an affordable price. Whether you have 25 or 25,000 users. Our flagship product, CYAN Secure Web, can help you meet specific business goals while controlling access to and from inappropriate websites and applications. We protect your system from outside threats, as well as from internal misuse of the Internet. Plus, our network of professional channel and integration partners helps you apply our products to best meet your needs. Our in-house support team is always ready to lend a hand, too. And, that saves you time and money. Improves productivity. And helps keep your business safe. How do we do it? Simple. We dig deeper.

3 We dig deeper...to make the Web safe for you. Our core business is keeping you safe when you browse the Internet. To do that, CYAN Network Security solutions block non-business-relevant websites and inappropriate applications from your system. When it comes to modern websites and applications, "WYSIWYG" (What You See Is What You Get) is no longer true. Lots of data is transferred in the background without our notice, containing hidden objects and unsecured data that presents threats to your system. Our business is to identify the good and keep away the bad. We help you close the door on Web spam, malware and other unwanted Internet content. We help you stop phishing attacks from entering your system. We help you implement responsible and safe Web browsing.

4 We dig deeper...to save you time, money and headaches. You ll begin to see the benefits of our solutions from the first day you use CYAN Secure Web. An easy-to-use Web interface gets you up and running in no time, and keeps you up-to-date. Integrated category filters and anti-virus engines make customization fast and simple. SSL interception gives you easy control of filters on encrypted data streams. Scalability lets you adapt our solutions to multi-core and multi-cpu systems with minimal effort. Flexible deployment means you can install Secure Web easily to a wide variety of platforms. Integrated reporting helps you evaluate system efficiency in a timely manner. Straightforward, scalable subscription fees translate into solutions that every company can afford. Professional support from a European based network of partners reassures you that help is always close at hand.

5 We dig deeper Secure List Secure List is a database organized into categories of similarly-themed websites. You can activate one or more categories according to your needs: for a specific user, defined user groups or individual IP addresses. When you do, those users can no longer access the websites, which are not relevant to your business. Which helps keep your company productive. We update Secure List daily, then download it automatically to your installation. So, your system is always up-to-date. to give you time-tested, flexible Web solutions for your business security needs. Application Blocking Nearly every modern application incorporates Web technologies, to "talk" to the Internet. But most firewalls allow access only from HTTP and HTTPS. So, applications "wrap" themselves in HTTP to be accepted by your firewall. There s only one problem: firewalls and standard proxy servers don t know what s actually being transferred inside the HTTP "wrapper"". Application Blocking helps you uncover the real data, and the danger that can come with it. It analyses Internet requests in various ways to detect embedded protocols, types of data transported and other typical traffic characteristics. Then, it builds a profile of the application and its purpose. So that you can "see" what is really inside the traffic. Just like with Secure List, you can permit or refuse an application as you like: for a specific user, defined user groups or individual IP addresses. Secure List Categories x Ads x Alcohol & Tobacco x Communities x Dating x Downloads x Drugs x Education x Finance x Gambling x Games x Government x Health care x Hosting x Jobs x Military & Weapons x Mobile phones x News x Phishing / Spyware / Virus / Proxies x Pornography x Real estate x Religion x Search engines / Directories x Shopping x Sport x Streaming media x Travel x Vehicles x Violence x Webmail x Audio/video x Messenger x Office documents x Executables x Active content

6 We dig deeper to stop viruses and malicious code before they reach your systems. CYAN Secure Web gives you in-depth coverage, complementing your client anti-virus software. Our protection starts at the gateway, where we scan incoming data to prevent infected files from entering your network domain. We integrated anti-virus scanners into CYAN Secure Web, so your administrative tasks are minimal. All you have to do is decide which scan engine to use. And, to block viruses, Trojan horses, worms and other malicious code hidden in encrypted data, CYAN Secure Web first breaks up the data, then applies its filters to the clear text stream. Of course, we make the clear text available only in your proxy server memory. That means that the data is still encrypted when transferred to your network. Together these features give you better system performance and stability. And peace of mind.

7 We dig deeper into encrypted traffic SSL is a good thing. It ensures that your communication channel is secure when you transfer data. But, your system may not be safe, because a classic firewall is "blind" to content in encrypted connections. Even when the system displays user warnings about invalid security certificates, most people simply click "Continue" when they see these browser popups. Something we call "click-thru syndrome." Which means that undesirable data can be entering your network. CYAN Secure Web helps remove the danger caused by "clickthru syndrome." It gives you the power to control the policy and access in handling certificate validation failure. It intercepts encrypted connections to reveal the traffic inside the proxy in clear text. Then, it applies all filters, including anti virus scanning, without losing the security of transport link encryption. When you activate CYAN Secure Web SSL interception, your security solution can "see" clearly.

8 We dig deeper to help you make informed decisions about your Internet security. Reporting System is our database analysis tool that lets you know what s going on in your system. You can direct the Internet traffic logs of all your CYAN Secure Web installations into one central database, then use Reporting System to compile quick, comparison and summary reports. And, knowledge is power. Reports show you the results of your efforts and of your investment in CYAN Secure Web. Reports give you a comprehensive insight into your system. Reports help you evaluate the effectiveness of your security solution, so you can make adjustments, as necessary, to keep your network safe.

9 CYAN Secure Web a proxy server with many faces. CYAN Secure Web is a proxy server. You can use it as a standalone, dedicated proxy server. So far so good. But, you have many more deployment scenarios and keywords with our solution. CYAN Secure Web is a proxy server that is: Authorize, controll and protect your Internet users. Firewall Clients Highly available. You can build a cluster to ensure that your proxy service is always on and available. Load balanced. You can build a cluster of two or more nodes that share the load across all machines. Scalable. You can add a node to the cluster whenever necessary, adapting to your changing business needs. Transparent. You can incorporate the proxy in the Web traffic even if your client PC is not configured for this purpose. Distributed. You can manage a farm of proxies, installed in different locations or branches of your company, from a single, central point. Multi platform. You can choose the platform that best fits your environment. Integrated. You can attach the proxy to your authentication infrastructure, and control the activities of both individuals and groups of users. CYAN SECURE WEB Authentification Server Active Directory e-directory LDAP-Server Database

10 to make sure your system is available when you need it. CYAN Secure Web Cluster Firewall CYAN SECURE WEB CLUSTER We know that, sooner or later, all computer systems fail. But if your business success depends on reliable, available Internet access, CYAN Network Security can help you eliminate this potential. A redundant "active-passive" system wastes your resources and money. That s why we designed our proxy system to work "active-active" in clusters of multiple appliance machines. Based on standard server hardware, the system is made redundant, and the load is shared across all nodes. This eliminates idle server time. And gives you high availability and load balancing. And, as your needs grow, your clusters can increase with them. Just add a machine to the cluster, and you re up and running. With CYAN Secure Web, your system responds when you need it. With no wasted computing power. With no special hardware. Available, efficient, scalable, quick and easy. So, your system network runs at its highest level.

11 CYAN Secure Web Secure Web for Linux ready for you on multiple platforms. Installation, updates and upgrades are easy. We supply our solution for the Linux platform as easy-to-install packages for your corresponding software management system. Well-defined version management makes it easy to keep your security solution always up-to-date. Secure Web for Linux is: Installable and updated using our online software repository Managed using your favorite Web browser PVE Secure Web PVE Image The Proxmox Virtual Environment (PVE) is an easy to use Open Source virtualization platform for running Virtual Appliances and Virtual Machines. Based on Ubuntu server, our Secure Web PVE Image is: A ready-to-go, certified virtual appliance for the Proxmox Virtual Environment An easy-to-use appliance template you can configure and start up in only seconds Updated and upgraded easily from our online software repository Secure Web for Windows Our version for Windows comes as a software package that installs and integrates seamlessly with your existing Windows based infrastructure. Secure Web for Windows is: Managed using your favorite Web browser Updated and upgraded easily with our sophisticated setup software Secure Web vmware Image Our ready-to-go virtual appliance is based on Ubuntu server, included with Secure Web for Linux. Secure Web for vmware Image is: Installable on any vmware product and ready to start using the proxy service Updated and upgraded easily from our online software repository Secure Web Appliances Our all-in-one hardware appliance is the optimal customized platform that makes the deployment of Secure Web really easy. Use your favorite Web Browser for configuration and all operating tasks are. You don t need any knowledge about the integrated operating system. Secure Web Appliance is: A self-contained black-box that lets you startup and surf immediately Operated entirely with your favorite Web browser Updated and upgraded in your Web interface

12 CYAN Secure Web Appliance content security in a box. DS1 RS4 RS6 RS8 VIA Eden 1,2 GHz CPU 4x Ethernet 10/100 MBit 1 GB RAM 40 GB HD External Power Supply Dimensions (W x L x H): 300x78x220 mm up to 100 users * Intel Celeron E1200 DC (Dual Core) 4x Ethernet 10/100/1000 MBit 4 GB RAM ECC 2x 250 GB HD Raid 1 Depth: System with 1 Height Unit up to 1,000 users * Intel Q6700 2,66 GHz (Quad Core) 4x Ethernet 10/100/1000 MBit 8 GB RAM ECC 2x 250 GB HD Raid 1 Depth: System with 1 Height Unit up to 5,000 users * 2x Intel Xeon DP E ,66 GHz (Quad Core) 4x Ethernet 10/100/1000 MBit 8 GB RAM ECC 2x 250 GB HD Raid 1 Depth: System with 2 Height Units up to 10,000 users * * Capacity depends on the environment and the selected options Our appliances are servers that are built on standard industry components. We make sure they are well-defined to supply you with a high quality product that meets the requirements of a proxy server system. And our appliances contain an operating system - proxy bundled solution, operated solely using your favorite Web browser. To meet the needs of businesses of all sizes, we have four models for you. Here are the specifications, including the approximate maximum number of users that each machine can handle.

13 ...content security in a box. CYAN Secure Web Appliances Zero Conf Technology All Secure Web appliances include zero conf technology. This saves your entire system configuration to an integrated SD card. If you replace an appliance, you can swap servers by just inserting your old SD card into your new system. Your new machine will restore all settings. Operations continue seamlessly with your new appliance hardware. Advanced Unit Replacement Advanced Unit Replacement (AUR) is an extra service from CYAN Networks for a quick replacement of a defective system. We send you a replacement unit fast by the next business day to keep your downtime to a minimum. High Availability & Load Balancing You can connect all your appliances together to create a load-balancing cluster. Your first two nodes are set up for fault tolerance to provide high availability. The setup is in active/active mode, to give you load balancing with only two nodes. And you can add any number of machines to scale, according to the needs of your environment.

14 CYAN Secure Web HTTP / HTTPS, FTP-over-HTTP, POP3, IMAP proxy Authentication Microsoft Active Directory, NTLM transparent authentication e-directory transparent authentication LDAP authentication SQL database authentication IP based authentication Support for terminal server environments Integrates with Microsoft ISA Server Flexible deployment Passthrough mode Transparent mode Caching, caching exceptions Proxy cascading & conditional routing, including backup routes WCCP support Content filtering URL filtering by category (Secure List) User defined categories Individual exceptions and extensions to Secure List Application detection and filtering - Executables, binaries - Archives, Images, Audio/Video data - ICQ, MSN Messenger, Skype Mime type and cookie filtering File extension filtering Configurable exceptions to all filtering mechanisms Soft Use Policy Whitelisting HTTP method filter (including WebDAV) Detects and reacts conditionally depending on the user agent Customizable status and filtering pages Scalability, high availability and load balancing High performance and reliability Modular architecture for distributed deployment Self-healing technology Ready for use within the telecom. industry (carrier grade) SSL intercept mode Interception of HTTPS, POP3S and IMAPS Apply all content filters including virus scanning on encrypted traffic Certificate validation and security policies per profile Peer-to-peer service control Instant messaging control Dynamic protocol detection Control of interception and exceptions per profile Management (create/import) of a certification authority Dynamic creation of signed certificates Plain-text forwarding of intercepted connections Filtering profiles Profile assignment per user, group or IP address Assign different profiles per time interval Dynamic, hierarchical profiles Virus scanning Integrated ESET NOD32 engine Integrated Sophos engine Support for any command line scanner Control of Anti-Virus scanning per profile Management of AV scanning exceptions Web based administration interface No client installation necessary Remote administration from any browser Sophisticated, easy to use Web 2.0 interface Reporting System More than 60 report templates Report execution scheduler Send report results via Report output in PDF, HTML, CSV, XML User role model Four-eye-principle System Requirements Linux Debian 5 or later Ubuntu 8.04 or later Redhat Enterprise Linux 5 or later SUSE Linux Enterprise Server 10 or later Microsoft Windows Windows 2003 Server or later Other platforms VMware Image: all vmware products PVE Image: Proxmox Virtual Environment version 1.0 or later Microsoft ISA Server 2004 or later Database systems supported PostgreSQL 8.x MySQL 5.x Microsoft SQL Server 2005 or later (including Express Edition) Java Embedded Database Recommended platforms Ubuntu Server 8.04 or later CYAN Secure Web hardware appliances

15 Are you ready to dig deeper? We can help you move ahead with our network of professional integration and distribution partners. And let you tap into the experience we ve gained with small, medium and large customers in the public and private sectors, and in government. Sign up for a free trial subscription to CYAN Secure Web to see for yourself how you can gain a competitive edge in your market. Contact CYAN Network Security today to learn more. CYAN Networks Software GmbH Hainburger Strasse 34 A-1030 Vienna Tel Fax sales@cyan-networks.com 2010 Cyan Networks Software GmbH. All rights reserved. CYAN Network Security and CYAN Secure Web, are registered trademarks of CYAN Networks Software GmbH. All other trademarks and registered trademarks are the property of their respective owners.

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

The professional IT management platform

The professional IT management platform The professional IT management platform Total Control of Your IT Infrastructure Whether you are administrating your own IT, or providing services to your clients, with ITbrain you amaze with proactivity.

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

IronPort X1000 Security System

IronPort X1000  Security System I r o n P o r t E M A I L S E C U R I T Y A P P L I A N C E S T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

IronPort C100 for Small and Medium Businesses

IronPort C100 for Small and Medium Businesses I R O N P O R T E M A I L S E C U R I T Y A P P L I A N C E S S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Security with Passion. Endian UTM Virtual Appliance

Security with Passion.  Endian UTM Virtual Appliance Security with Passion Endian UTM Virtual Appliance Endian UTM Virtual Appliance Endian UTM Virtual Appliance: Secure and Protect your Virtual Infrastructure Whether you are securing your internal virtual

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

All-in one security for large and medium-sized businesses.

All-in one security for large and medium-sized businesses. All-in one security for large and medium-sized businesses www.entensys.com sales@entensys.com Overview UserGate UTM provides firewall, intrusion detection, anti-malware, spam and content filtering, and

More information

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017 Sophos Web Appliance Configuration Guide Product Version 4.3.5 Sophos Limited 2017 ii Contents Sophos Web Appliance Contents 1 Copyrights and Trademarks...1 2 Introduction...2 3 Features...4 4 Network

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017

Sophos Web Appliance Configuration Guide. Product Version Sophos Limited 2017 Sophos Web Appliance Configuration Guide Product Version 4.3.2 Sophos Limited 2017 ii Contents Sophos Web Appliance Contents 1 Copyrights and Trademarks...4 2 Introduction...5 3 Features...7 4 Network

More information

2 ZyWALL UTM Application Note

2 ZyWALL UTM Application Note 2 Application Note Threat Management Using ZyWALL 35 UTM Forward This support note describes how an SMB can minimize the impact of Internet threats using the ZyWALL 35 UTM as an example. The following

More information

Microsoft Internet Security & Acceleration Server Overview

Microsoft Internet Security & Acceleration Server Overview Microsoft Internet Security & Acceleration Server 2006 Overview 1 What is ISA Server 2006? Three Deployment Scenarios Making Exchange, SharePoint and Web application servers available for secure remote

More information

USG2110 Unified Security Gateways

USG2110 Unified Security Gateways USG2110 Unified Security Gateways The USG2110 series is Huawei's unified security gateway developed to meet the network security needs of various organizations including the small enterprises, branch offices,

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Lotus Protector for Mail Security

Lotus Protector for Mail Security Lotus Protector for Mail Security A Consultant in your Pocket series webinar Presented by: Victor Toal Lotus Protector for Mail Security What we will cover in this Webinar 1 Lotus Protector for Mail Security

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

Secure Web Appliance. Basic Usage Guide

Secure Web Appliance. Basic Usage Guide Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the

More information

Avira Premium Security Suite User Manual

Avira Premium Security Suite User Manual Avira Premium Security Suite User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Key advantages Full suite DLP solution Short time-to-benefit High level of tamperresistance All speciality functions covered against leakage Agnostic approach Clearly defined data

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients. THE KERNEL Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients. Since our founding in 1986, and establishing The Kernel s UAE office in 2008, our company

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Unified Threat Management Systems

Unified Threat Management Systems Unified Threat Management Systems 500 POWER HDD Another Product by Open Kod TO SOLVE AND TO SECURE www.openkod.com MALAYSIA CYBER SECURITY INNOVATION OF THE YEAR AWARD 2016 WINNER - OPENKOD SDN BHD Unified

More information

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances TMG Server 2010 Appliance (ntmg or ntmge Series) provides value to IT managers, network administrators,

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

Key Features. DATA SHEET

Key Features.  DATA SHEET DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive

More information

Avira Endpoint Security. HowTo

Avira Endpoint Security. HowTo Avira Endpoint Security HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient administration...4

More information

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE OFFICE OF THE MISSION DIRECTOR, NATIONAL RURAL HEALTH MISSION, ASSAM Saikia Commercial Complex, G. S. Road, Christianbasti, Guwahati - 781005 Ph. 0361 2340236:: Fax 0361 2340238 Website : www.nrhmassam.in

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall

New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall Claudiu Onisoru, Senior Network Specialist Cisco Connect - 15 May 2014 1 Agenda Frontal Communication: Who

More information

About Us. The Solution. The Threat

About Us. The Solution. The Threat White Paper About Us Sasa Software specializes in IT security. It is owned by Kibbutz Sasa, situated on the Meron Nature Reserve in the northern part of Israel. Kibbutz Sasa is also the owner of Plasan

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most:

More information

advanced call analytics for large multi-site organisations

advanced call analytics for large multi-site organisations advanced call analytics for large multi-site organisations Overview gives you all the information you need to manage your telecoms infrastructure is built upon a unique objects-based directory that places

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical

More information

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com) ANTIVIRUS SITE PROTECTION (by SiteGuarding.com) USER GUIDE Version 0.1.0 1 Table of content 1. INTRODUCTION. 3 2. HOW IT WORKS.... 6 3. HOW TO CONFIGURE.. 7 2 1. INTRODUCTION Antivirus Site Protection

More information

Network. Arcstar Universal One

Network. Arcstar Universal One Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than

More information

Mobile County Public School System Builds a More Secure Future with AMP for Endpoints

Mobile County Public School System Builds a More Secure Future with AMP for Endpoints Mobile County Public School System Builds a More Secure Future with AMP for Endpoints Cisco AMP for Endpoints met our needs from all security standpoints. We re seeing more and AMP is catching things that

More information

Barracuda Networks Portfolio. Bartłomiej Moczulski Sales Engineer CEE

Barracuda Networks Portfolio. Bartłomiej Moczulski Sales Engineer CEE Barracuda Networks Portfolio Bartłomiej Moczulski Sales Engineer CEE Overview Filtering Networks Data Storage Barracuda Spam & Virus Firewall Barracuda Load Balancer Barracuda Message Archiver Barracuda

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Sophos Management Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos Management Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Management Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Management Appliance Contents 1 Copyrights and Trademarks...3 2 Introduction...4 3 Features...6

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

tomorrow s protection today

tomorrow s protection today tomorrow s protection today Your Guide to Security Software That Doesn t Get in the Way of Business 80 million people trust us to keep them safe online and so can you. WHY AVG? When your employees go online,

More information

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway GFI Product Comparison GFI WebMonitor 2015 vs. McAfee Web Gateway Features GFI WebMonitor 2015 McAfee Web Gateway General features Platforms Windows servers and workstation OS Standalone proxy Win 7, 8,

More information

Edge for All Business

Edge for All Business 1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or

More information

Vital Security Supported Topologies

Vital Security Supported Topologies Vital Security Supported Topologies Software Release 9.0 Vital Security Supported Topologies Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights

More information

Easy To Install. Easy To Manage. Always Up-To-Date.

Easy To Install. Easy To Manage. Always Up-To-Date. WATCHGUARD FIREBOX SYSTEM Easy To Install. Easy To Manage. Always Up-To-Date. Overview The WatchGuard Firebox System is a comprehensive firewall and VPN security solution that reduces the time and resources

More information

TrustNet Manager Group Encryption Management for Policies, Keys and Devices

TrustNet Manager Group Encryption Management for Policies, Keys and Devices Group Encryption Management for Policies, Keys and Devices Product Overview is a web-based management platform that simplifies security management while preserving network performance and functionality.

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

Test Report April esafe Virtual Appliance

Test Report April esafe Virtual Appliance Test Report April 2008 esafe Virtual Appliance Vendor Details Name: Aladdin Knowledge Systems Address: HQ: 35 Efal St., Petah Tikva, 49511, ISRAEL UK Office: Fairacres House 2-3, Fairacres Industrial Estate,

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Cisco Configuration Engine 2.0

Cisco Configuration Engine 2.0 Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Innovation IT Services Price List

Innovation IT Services Price List Innovation IT Services Price List 2016-2017 Tel: 0330 330 8956 email: itsales@innoit.co.uk How to complete the Keep My Number porting form - v1.1 st Effective Date: 31 June 2014 Contents: 3/4: Microsoft

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Safetica ESET Technology Alliance Data Leak Prevention by Safetica Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security

More information

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

Protection Service with Continuity

Protection Service with  Continuity EveryCloud Email Protection Service Cloud Based Anti-Spam, Anti-Virus and Business Email Management. Block spam and email viruses in the cloud before they reach your network, whilst taking control of your

More information

Seqrite Antivirus for Server

Seqrite Antivirus for Server Best server security with optimum performance. Product Highlights Easy installation, optimized antivirus scanning, and minimum resource utilization. Robust and interoperable technology makes it one of

More information

Stonesoft Management Center. Release Notes Revision A

Stonesoft Management Center. Release Notes Revision A Stonesoft Management Center Release Notes 6.1.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5 Enhancements

More information

Endian Hotspot main features

Endian Hotspot main features Endian Hotspot main features Service Customization Freely configurable home page after successful login Completely customizable welcome page and printed user information through a user friendly visual

More information

Selftestengine q

Selftestengine q Selftestengine 700-281 49q Number: 700-281 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ 700-281 Web Security for Field Engineers Still Valid in Egypt, Passed today

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

CYAN SECURE WEB HOWTO. SSL Intercept

CYAN SECURE WEB HOWTO. SSL Intercept CYAN SECURE WEB HOWTO January 2009 Applies to: CYAN Secure Web 1.6 and above allows you to inspect SSL encrypted traffic. Therefore all filter mechanisms can be applied to HTTPS traffic. Without, all data

More information

Silicon House. Phone: / / / Enquiry: Visit:

Silicon House. Phone: / / / Enquiry:  Visit: Silicon House Powering Top Blue Chip Companies and Successful Hot Start Ups around the World Ranked TOP Performer among the registrars by NIXI Serving over 750000 clients in 90+ countries Phone: +91-7667-200-300

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com) ANTIVIRUS SITE PROTECTION (by SiteGuarding.com) USER GUIDE Version 1.0.0 Antivirus Site Protection (by SiteGuarding.com) 1.0.0 1 Table of content 1. INTRODUCTION. 3 2. HOW IT WORKS.... 6 3. HOW TO CONFIGURE..

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

THE HP Storageworks X510 Data Vault

THE HP Storageworks X510 Data Vault THE HP Storageworks X510 Data Vault REVIEWER S GUIDE STORe it. SECURE it. SHARE it. October 2009 introducing the NEW THE HP Storageworks X510 Data Vault If, like many small business firms, you are sharing

More information

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget. XG Firewall What s New in v17 Setup, Control Center and Navigation Initial Setup Wizard Introduced in a Maintenance Release, a new initial setup wizard enables quick and easy out-of-the-box setup. In addition

More information