2 Comprehensive Security Solutions Built for Today s Networks iboss provides solutions that protect thousands of enterprises, service providers and government networks against a new era of cyber threats. Our game-changing security platform with innovative architecture is backed by over 60 patents and patents pending, and chosen by over 4000 enterprises worldwide to increase their cyber security posture. This has made iboss one of the fastest growing cyber security companies in the market. iboss is trusted by thousands of organizations and millions of users worldwide. Our customer-centric focus is demonstrated by an industryleading customer retention rate of over 98.5%. iboss Solutions Highlights Ground-breaking FireSphere targeted attack defense including exclusive network baselining for anomaly detection Unparalleled inbound/ outbound visibility across all data channels Granular application control designed for today s application-intensive environments Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud Accelerated speed to response that translates network events into actionable threat intelligence Low TCO with unrivaled easeof-use and world-class support Our Products Advanced Defense Against APTs and Evasive Infections Flexible Deployment Options Next-gen Web and Application Security for the borderless network On-Premises Cloud Hybrid Mobile Security for the Borderless Network
3 Advanced APT Defense Prevents Targeted Attacks and Detects Evasive Infections to Reduce Data Exfiltration As countless high-profile data breaches demonstrate, stopping 100% of advanced malware is unrealistic. That s why iboss created FireSphere, the ground-breaking APT and evasive infection defense that not only secures organizations against APTs, criminal malware, and other advanced threats, it also detects and responds to infections on your network in real-time to reduce data exfiltration. No other security solution combines FireSphere s advanced, proprietary features. Network Baselining for Anomaly Detection FireSphere Highlights Superior threat protection that combines both signatureless malware defense and infection detection at the gateway Comprehensive analysis of suspicious files with behavioral sandboxing in the cloud, or onpremises, including auto-deposit and on-demand functionality Unrivaled protection against data exfiltration with anomaly detection through network baselining, a feature no one else offers Actionable intelligence with fewer alerts and false positives via the CISO Command Center and the Threat Intelligence Cloud Intrusion defense with content-aware DNS, SSL and data inspection BYOD and heterogeneous device protection with auto-quarantine of high-risk devices and users Detecting infections on the network is becoming increasingly difficult as sophisticated malware exploits use evasive maneuvers to mask communication. FireSphere Network Anomaly Detection goes beyond monitoring C&C (command and control) communication to incorporate advanced technology that continuously monitors and compares your current network traffic to pinpoint unusual behavior, indicating your network has been compromised. FireSphere baselining technology was developed and patented by iboss and we are the only security vendor to integrate this advanced capability into our data defense solution. It leverages iboss visibility across all data channels and ability to maintain over a TB of historical event logs, to establish a baseline for normal network traffic. It then monitors data movement on a variety of parameters such as the volume of bytes in or out, the number of connections being attempted, the intended geo-destination and others, to compare traffic and detect anomalies. Once a problem is revealed, the data transfer is stopped, giving you time to investigate and remediate to prevent data exfiltration. Behavioral Sandboxing Auto Deposit and On-Demand FireSphere Sandboxing isolates and executes suspicious files in a safe environment to deliver in-depth analyses of complex malware and polymorphic viruses. This proprietary features scans all traffic and auto-deposits suspicious files, or use the exclusive on-demand option to add objects manually. CISO Command Center FireSphere s exclusive CISO Command Center provides instant and comprehensive visibility into threats and infections, with real-time threat intelligence from FireSphere and the iboss Threat Intelligence Cloud. The results are correlated across a wide range of parameters, giving you instant, actionable forensic intelligence on zero-day threats and evasive malware. Getting hundreds of alerts from one piece of malware generating multiple callbacks could quickly overwhelm your resources. FireSphere translates events into actionable intelligence, with technology that compiles and correlates threat intelligence to deliver prioritized alerts, allowing you to respond immediately, without wasting valuable IT resources. Threat Intelligence Cloud FireSphere allows you to stay ahead of polymorphic malware and APTs by collecting global threat intelligence in the cloud, from millions of iboss endpoints and over 55 advanced global malware engines and correlating it to deliver comprehensive zero-day threat information to the CISO Command Center.
4 Web Security Highlights Web and Application Security Outbound Visibility across All Ports Traditional Web security solutions were designed to focus on HTTP/ HTTPS traffic across ports 80 and 443, but cybercriminals are using hidden UDP channels to distribute data-stealing malware. Only iboss technology gives you visibility and control over all inbound/outbound data channels and all protocols on your network, including streaming data across all 65,535 UDP ports that other solutions can t see. And iboss technology has the ability to stop UDP data transfers mid-stream, preventing dangerous malware from reaching your network. No other solutions offer this level of advanced Web and Application protection. Watching only standard ports creates a blind spot for outbound data loss Port 80 Port 443 HTTPS/SSL Traffic Scanning Organizations depend on HTTPS/SSL encryption to protect sensitive data as it leaves and enters the network, but today s advanced threats are often hiding in SSL traffic. Most security solutions that claim they scan and decrypt SSL, do so at the gateway, which can create latency, open security holes and leave you vulnerable to man-in-the-middle (MiTM) attacks. iboss proprietary technology scans SSL traffic at the individual workstation, which retains data integrity throughout the transmission, while eliminating network bottlenecks and preventing dangerous MiTM attacks. In addition, the iboss proprietary approach allows you to set policies to enable selective SSL decryption, offering the advantage of letting innocuous transmissions pass-by, while decrypting suspicious or sensitive data transfers as needed. Advanced Application iboss proprietary application scanning with deep packet inspection secures the gateway from unwanted applications and threats, with multi-layered security that includes torrent and file-sharing protection, dynamic proxy circumvention detection, advanced protocol management and trigger-based alerts. iboss advanced signatures and heuristics combined with stream-based blocking capabilities assure that even complex applications running on stateless UDP protocols are inspected and blocked at the gateway. Intelligent Bandwidth /QoS Advanced threat defense with visibility into hidden ports standard solutions don t see Protection from circumvention attempts and MiTM attacks with advanced SSL defenses including selective decryption Application control with granular, content-aware application management Network availability ensured with Intelligent Bandwidth Borderless network protection with BYOD controls Integrated single pane-of-glass reporting across all devices and users on or off-premises iboss Intelligent Bandwidth assures maximum network efficiency with flexible stream-based technology that is directory-aware, enabling granular control of bandwidth during peak usage hours. Unlike standard stateful shaping technology, which continuously applies policy per domain or IP, iboss binds directory services to bandwidth policies, enabling dynamic throttling that supports critical business processes while maintaining optimal network performance. BYOD (bring your own device) The iboss Secure Web Gateway integrates BYOD management to extend advanced threat protection and DLP to all the BYOD users on your network, while ensuring increases in bandwidth demand don t affect mission critical traffic. iboss also identifies BYOD users not using a NAC and provides a captive portal that binds them to your network directory or LDAP automatically, assuring accurate policy enforcement across all users, whether on wired or wireless devices. iboss BYOD tools include advanced application controls and High Risk Auto Quarantine, enabling you to lock users engaged in high-risk online behavior.
5 Mobile Security Highlights Cloud Web Security and integrated MDM The evolution of mobile connectivity has changed the modern workplace, creating more productivity and efficiency, but also increasing security challenges. iboss MobileEther easily enables your mobile workforce with seamless cloud integration and proprietary mobile device management (MDM). Integrated Cloud Web Security MobileEther is the only security solution that integrates robust Web Security with full-featured mobile device management (MDM) to deliver advanced protection of users, devices and your network. iboss streamlined, one-click authentication allows you to deploy Web security features seamlessly on any mobile device to ensure your security policies are enforced, whether on or off the network. MobileEther also provides granular application, social media and SaaS controls that govern user activities and are integrated with iboss comprehensive reporting and the real-time threat and bandwidth dashboards. Seamless integrated Cloud Web Security and proprietary Mobile Device Advanced Web Security features delivered across all mobile users in one-click Full-featured, proprietary MDM that protects mobile devices and the network Streamlined authentication for accurate policy enforcement regardless of user location Proprietary Mobile Device MDM features include remote wipe of lost or stolen devices, removal of unapproved apps, disabling of device functions such as cameras and more. You can locate devices with geomapping, remotely scan and selectively wipe them and lock or push apps. trigger alerts provide insight on events, such as a device leaving the network, unapproved apps or policy violations. If you already have an MDM solution, MobileEther can be installed with MDM disabled. Threat and Event Console Reporting The exclusive iboss Threat and Event Console delivers integrated, single pane of glass visibility across all iboss Web Security, FireSphere Advanced APT Defense and Mobile Security solutions. It boasts a highly-responsive, intuitive interface, guided interactive wizards, and customizable reporting templates. Within seconds, go from organization-wide visibility, to a 360-degree view of each network user, including Web activity, application use, bandwidth consumption, threats and more. Threat and Event Console Highlights Real-time intelligence with Live Threat Dashboard Optimal network performance with Live Bandwidth Dashboard and Dynamic Plotter Location-aware visibility with GeoMapping and HeatMap Technology Validation of policy violations with unique Desktop Activity Recorder Accurate compliance and AUP enforcement with comprehensive Web Security reporting Dynamically indexed data logs for unrivalled detect and respond capabilities to reduce data exfiltration
6 Why organizations choose iboss iboss leads the industry in protection against targeted attacks and holds over 60 patents and patents pending for our cutting-edge technology. Here are some key differentiators demonstrating iboss leadership in the cyber security industry: Behavioral Data Anomaly Detection iboss is the only security vendor offering patented technology that reduces data exfiltration by monitoring how network data behaves and detecting anomalies in that behavior. Integrated Gateway Security iboss solutions are built on streambased technology that delivers visibility across all non-standard ports and protocols, to detect and respond to network traffic anomalies and eradicate evasive malware other gateway solutions miss. Dual Behavioral Sandboxing iboss FireSphere includes proprietary behavioral sandboxing that auto-deposits suspicious files for in-depth analysis and includes an on-demand option. Correlated Global Threat Intelligence iboss correlates global cloud threat intelligence in real-time to translate events into actionable intelligence, reducing alerts and false positives. Our faster, more comprehensive reporting makes good admins better and the best admins faster. Location-Based Policy Enforcement iboss patented technology enables enforcement of regulatory and security policy requirements, for individuals and groups, across all devices whether on or off the network. Advanced SSL Security Exclusive, patented selective decryption eliminates latency typical of other solutions, while increasing the security, performance and scalability required to analyze encrypted streams Flexibility and Scalability iboss technology was developed with infinite scalability capable of handling even the largest and most bandwidth-intensive deployments. In addition, iboss solutions are the easiest to deploy and manage, conserving valuable IT resources. Comprehensive Interoperability iboss advanced solutions can be deployed as standalone products or easily integrated into your current deployments to lower TCO while increasing your security posture. Concierge Technical Support Staffed by IT Engineers We offer 24/7/365 technical support from experienced network engineers, who guide even the most complex solution deployments. Unrivalled Customer Satisfaction iboss security solutions protect thousands of organizations and millions of users globally and has delivered a customer retention rate of 98.5% for the last 3 years. iboss Cybersecurity Offices: NORTH AMERICA East Coast: Florida 550 W. Cypress Ave #470 Fort Lauderdale. FL High Tech Avenue Suite 200 Orlando. FL West Coast: San Diego Corporate Office 9950 Summers Ridge Rd. #160 San Diego. CA Irvine 5 Park Plaza. Suite 350 Irvine. CA UNITED KINGDOM ICS House. 3rd Fl. Suite 3.2 Hall Road. Maldon. Essex. CM9 4LA United Kingdom PB-US-01/15 LATIN AMERICA Arenales B Buenos Aires. Argentina (1425)
Network World and Robin Layland present The 2013 Next Generation Firewall Challenge Next Generation Firewalls provide the needed protection against Advance Evasion Techniques 2013 The 2013 Next Generation
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Leveraging Configuration and Vulnerability Analysis for Critical Assets and Infrastructure May 2015 (Revision 2) Table of
10 Things Your Next Firewall Must Do Introduction Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices.
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
Nine Essential Requirements for Web Security Enabling safe, productive access to social media and other web applications Table of Contents Executive Summary...3 Introduction...4 Web Security Concerns....4
Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure A call to action for IT and security professionals Against a backdrop of unprecedented growth in smartphones
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Bernard Montel Directeur Technique RSA 1 RSA Security Management Compliance Vision Delivering Visibility, Intelligence and Governance 2 Traditional Security Is Not Working 99% of breaches led to compromise
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
Build a cloud network leveraging best-in-class security and application delivery 2 Introduction With the proliferation of enterprise applications, consumer applications and cloudbased services, IT managers
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Ten easy steps to secure your small business Small business network administrators need a workable plan to provide comprehensive security against today s sophisticated threats without spending too much
An Accurate and Effective Approach to Protecting and Monitoring Web Applications White Paper Web applications have lowered costs and increased revenue by extending the enterprise s strategic business systems
Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE FORTINET Controlling Web 2.0 Applications in the Enterprise PAGE 2 Summary New technologies used in Web 2.0 applications have increased
Building the Fortified Wireless LAN Consolidated, integrated security for wired and wireless networks FORTINET Building the Fortified Wireless LAN PAGE 2 Contents Introduction to Wireless Security... 3
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Secure Computing is a leading provider of enterprise gateway security solutions. Powered by our TrustedSource technology, our best-of-breed portfolio of solutions provides Web Gateway, Messaging Gateway,