ContentProtect Security Appliance. Reveal. Optimize. Protect.

Similar documents
C YMPH O N IX NET W O R K C OMPO SER. Reveal. Optimize. Protect.

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Next-Generation Firewalls: Critical to SMB Network Security

Network Performance + Security Monitoring

Zscaler Internet Security Frequently Asked Questions

Comprehensive security solution provides reliable connectivity and faster VPN throughput with unprecedented visibility from WatchGuard Dimension

The Benefits of SSL Content Inspection ABSTRACT

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

Application Visibility and Monitoring >

February Considerations When Choosing a Secure Web Gateway

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Phish Blocker: Spyware Blocker:

Secure Computing s TrustedSource

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Putting Web Threat Protection and Content Filtering in the Cloud

Ensure safe and appropriate web surfing for all users with customizable filtering.

How to Gain Visibility and Control of Encrypted SSL Web Sessions >

Next Gen Firewall and UTM Buyers Guide

The Ultimate Guide to Gaining Control of the WAN

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

How To Choose A Next Generation Firewall

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Secure Content Management: Protected, Productive Networks for Today s Businesses

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Advantages of Managed Security Services

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

The Advantages of Security as a Service versus On-Premise Security

The Impact of Anonymous Proxies In Education

Executive Summary. The Problem

CMPT 471 Networking II

Network Management and Monitoring Software

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Content-ID. Content-ID URLS THREATS DATA

Blue Coat WebFilter >

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

How To Choose A Network Firewall

Application Intelligence, Control and Visualization

Security Administration R77

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

The enemy within: Stop students from bypassing your defenses

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

The SIEM Evaluator s Guide

Allot Communications Solutions. Enterprise Solutions. Ensuring mission- and business-critical application performance, and controlling IT costs

Firewall and UTM Solutions Guide

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Intelligent, Scalable Web Security

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

isheriff CLOUD SECURITY

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Secure Web Gateways Buyer s Guide >

INTRODUCING isheriff CLOUD SECURITY

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Cascadia Labs URL Filtering and Web Security

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Applications erode the secure network How can malware be stopped?

Intelligent Policy Enforcement Solutions for Cloud Service Providers

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

Cisco Cloud Web Security

Saisei and Intel Maximizing WAN Bandwidth

Better protection for customers, and recurring revenue for you!

Firewall Feature Overview

Secure Remote Access Give users in office remote access anytime, anywhere

Check Point submitted the SWG Secure Web Gateway for

Still Using Proxies for URL Filtering? There s a Better Way

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Clavister InSight TM. Protecting Values

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step

Lab Testing Summary Report

Astaro Gateway Software Applications

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

BlackRidge Technology Transport Access Control: Overview

Uncover security risks on your enterprise network

The Cisco ASA 5500 as a Superior Firewall Solution

What would you like to protect?

McAfee Web Reporter Turning volumes of data into actionable intelligence

AVG AntiVirus. How does this benefit you?

Trend Micro Hosted Security Stop Spam. Save Time.

WebMarshal User Guide

Colt Smart Office. Flexible network services for the smaller business. / Next

Gateway Security at Stateful Inspection/Application Proxy

A Security and Acceleration Solution for K-12 Networks > White Paper

Executive Brief on Enterprise Next-Generation Firewalls

Datasheet. Cover. Datasheet. (Enterprise Edition) Copyright 2013 Colasoft LLC. All rights reserved. 0

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Network protection and UTM Buyers Guide

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Configuration Example

Transcription:

ContentProtect Security Appliance Reveal. Optimize. Protect.

Take Control of Your Internet Connection Internet content and applica- The ContentProtect Security you have is always the content tions have become indispen- Appliance answers this you need. It intelligently sible, mission-critical tools for crucial question with Secure prioritizes and manages content nearly every organization. Web Gateway appliances that and bandwidth so Internet However, all too often crucial make sure the Internet applications and hosted services information and services get content and applications you always run the way they re lost in the over-whelming depend on stay secure, fast supposed to. Plus, the CP Security volume of irrelevant and and available. Appliance keeps your organization safe from dangerous content recreational Internet content. So how can you take full The Security Appliance pro- and constantly evolving Internet advantage of everything our vides precise, fine-grained threats. connected world has to control over the infinite offer without all the dangers, variety of Internet content distractions and delays that that enters your network, come along with it? so the content

Reveal Deep packet inspection and detailed reporting provide total visibility into what network users are viewing on the Internet, which applications they re using and how Internet threats are affecting your organization. This detailed, accurate information about the Web traffic flowing through your organization allows you to place appropriate limits on users and keep your organization safe. Optimize Precise, fine-grained application control, bandwidth management and content shaping capabilities allow you to prioritize bandwidth, control users and place limits on recreational content and applications. The result is a fast, fully-optimized Internet environment where critical online content and applications are always available and where the content you have is always the content you need. Protect Proxy protection, content filtering and other advanced threat protection capabilities work together to identify and neutralize today s most sophisticated and dangerous Internet threats providing you can provide a safe, productive environment for all users.

Reveal Gain Total Visibility into Your Content, Applications, and Users The ContentProtect Security APPLICATION VISIBILITY Appliance brings visibility and Monitor application traffic to control to an otherwise chaotic determine bandwidth require- Internet environment. With the ments and set appropriate CP Security Appliance, you can priorities and limits. see exactly how your students or employees are using the INTERNET USAGE VISIBILITY Internet. Additionally, you can Know exactly how users are carefully monitor and control using the Internet, set appro- the performance of critical priate policies and restrictions, Internet applications, set and automatically enforce smart, policy-based limits and those restrictions. priorities and run detailed reports to identify and resolve DETAILED REPORTING problems quickly. Together Gain total visibility and these capabilities give you the enhance your ability to power to reveal exactly how identify and fix problems with everyone in your organization detailed reports on user is using the Internet, while activity, application traffic, providing complete control over potential Internet threats and much more. the online content and applications your organization depends on. The CP Security Appliance offers you total visibility with detailed reports and real-time traffic monitoring. We now have a tool to be able to see exactly where the bandwidth is being used up, and what individual user or what workstation is at the root of the issue Glen Hearell Network Analyst North Central Texas College

Optimize Make the Most of Your Bandwidth You can t afford to turn band- directly into better width usage into a free-for- performance without impos- all situation where YouTube ing crude or heavy-handed competes with critical applica- allow or deny restrictions. tions and bandwidth-hogging Internet users are allowed to BANDWIDTH SHAPING monopolize your connection. AND PRIORITIZATION The Security Appliance gives Place precise limits on the the ability to precisely define amount of bandwidth available and control how much band- to specific users, groups width is available for different or applications. types of content and applications. Even better, it allows you CONTENT SHAPING to carefully prioritize and AND PRIORITIZATION dynamically scale bandwidth, Set limits or prioritize band- recreational content is still width based on specific URLs, available when Internet domain names, content traffic is light. This intelligent, categories, MIME types and fine-grained control translates file types. With the Security Appliance, you can create rules that limit the amount of bandwidth available for less important contentand reserve bandwidth for mission-critical applications. Our purchase of ContentProtect recouped itself easily on just the increase in productivity in the use of our time. Our dealership is much more efficient, and we feel more secure. Joe Garcia Controller Weber BMW Dealership

Protect Keep Your Organization Safe from Hackers and Malware It s nearly impossible to keep SECURE TRAFFIC FILTERING up with the ever-increasing Monitor, analyze and filter volume and sophistication HTTPS traffic to eliminate of hackers, malware, and threats hidden inside dangerous content living on encrypted content. the Internet. With the Security Appliance, you won t have to ANONYMOUS PROXY thanks to its security capabilities PROTECTION Protect your organization that automatically monitor and protect your network from against today s most today s most sophisticated sophisticated threats with daily Internet threats. filter avoidance updates and dynamic content analysis that CONTENT FILTERING It really is as easy to use as it looks. During setup, downtime was minimal and ContentProtect's group policy settings gave me all the control I needed. Tyler Weneck Director of IT Expedited Services Inc. identifies and blocks dangerous Automatically detect and protect anonymous proxies. The Security Appliance is the only solution your network from dangerous information and ensure users that delivers hourly updated can access the content they protection against anonymous need through multi-layer proxies. filtering. This includes real-time dynamic URL categorization, INTERNET THREAT CONTROL URL database matching, URL Block web-based malware and keyword search and SafeSearch viruses with advanced search engine enforcement. database matching and client spyware removal capabilities. The Security Appliance provides some of the industry s most advanced URL-based and dynamic deep packet content filtering capabilities.

Inside ContentProtect Security Appliance The ContentProtect Security Appliance is a deep-packet, Layer 7 inspection appliance that scans, identifies and controls incoming and outgoing Internet traffic and provides advanced bandwidth management, application prioritization, reporting and threat protection capabilities. The CP Security Appliance delivers unified threat management and WAN optimization in one device, eliminating the latency and complexity caused by implementing multiple single-purpose appliances. Its revolutionary Network Analytics makes it easy to see and report on user activity, application performance and threat control by showing how isolated events impact performance as a whole. 1. Identify 2. Filter 3. Prioritize Use deep (layer 2-7) packet inspection to identify: Sort traffic based on type and origin: Control applications and dynamically shape traffic for: Application traffic Users & groups URL traffic Anonymous proxy traffic Spyware and virus threats Internet usage trends Real-time URL categorization URL database matching Keyword detection Deep HTML inspection HTTPS filtering Real-time anonymous proxy filtering Web-based threat removal Applications Users Web sites Web categories File & MIME types 4. Report Provide detailed information about: Users Applications Content Web usage Threats

Reinvent Your Relationship with the Internet The Security Appliance is ready to offer your organization new levels of Internet safety, performance and control, so you can maximize the value and productivity of your Internet connection. Visit www.contentwatch.com to learn more and schedule a live demo. Call us at: 866.765.7233 Visit our website at: ContentWatch.com