Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud



Similar documents
FireSphere Advanced APT Defense Web and Application Security Mobile Security

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

Meeting the Challenges of the Borderless Network: The Six Do s and Don ts of Effective Mobile Security

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID URLS THREATS DATA

February Considerations When Choosing a Secure Web Gateway

On-Premises DDoS Mitigation for the Enterprise

Managing SSL Traffic: An examination of SSL and how to secure it

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

McAfee Network Security Platform

Compliance Ready Mobile Device Management (MDM)

Concierge SIEM Reporting Overview

Enterprise Buyer Guide

Comprehensive real-time protection against Advanced Threats and data theft

Cisco Advanced Malware Protection

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

I D C A N A L Y S T C O N N E C T I O N

Achieve Deeper Network Security and Application Control

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cisco Advanced Malware Protection for Endpoints

Unified Security, ATP and more

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Defending Against Cyber Attacks with SessionLevel Network Security

Cisco Cloud Web Security

AppGuard. Defeats Malware

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Mobile in the Classroom: How to secure the borderless school network

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Secure Cloud-Ready Data Centers Juniper Networks

The Evolution of the Enterprise And Enterprise Security

Next-Generation Firewalls: Critical to SMB Network Security

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

SANS Top 20 Critical Controls for Effective Cyber Defense

INTRODUCING isheriff CLOUD SECURITY

V1.4. Spambrella Continuity SaaS. August 2

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Content Security: Protect Your Network with Five Must-Haves

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

APPLICATION PROGRAMMING INTERFACE

ENABLING FAST RESPONSES THREAT MONITORING

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Evolution Of Cyber Threats & Defense Approaches

Driving Company Security is Challenging. Centralized Management Makes it Simple.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

High End Information Security Services

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

The Hillstone and Trend Micro Joint Solution

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

End-user Security Analytics Strengthens Protection with ArcSight

Websense Data Security Solutions

Firewall Feature Overview

Next Generation Enterprise Network Security Platform

Effective Methods to Detect Current Security Threats

Putting Web Threat Protection and Content Filtering in the Cloud

Advanced Threat Protection with Dell SecureWorks Security Services

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Fighting Advanced Threats

Networking for Caribbean Development

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Symantec Endpoint Protection

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

isheriff CLOUD SECURITY

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Websense Web Security Solutions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Using Palo Alto Networks to Protect the Datacenter

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

WEBSENSE TRITON SOLUTIONS

Security Services. 30 years of experience in IT business

McAfee Network Security Platform A uniquely intelligent approach to network security

Achieve Deeper Network Security

Cisco Advanced Malware Protection for Endpoints

How To Manage Security On A Networked Computer System

PULSE SECURE FOR GOOGLE ANDROID

Top 10 Reasons Enterprises are Moving Security to the Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

ForeScout CounterACT. Continuous Monitoring and Mitigation

IBM Security Strategy

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Network Performance + Security Monitoring

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Netzwerkvirtualisierung? Aber mit Sicherheit!

WildFire. Preparing for Modern Network Attacks

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Security Information & Event Management (SIEM)

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

GOING BEYOND BLOCKING AN ATTACK

Transcription:

Comprehensive Security Solutions Built for Today s Networks iboss provides solutions that protect thousands of enterprises, service providers and government networks against a new era of cyber threats. Our game-changing security platform with innovative architecture is backed by over 60 patents and patents pending, and chosen by over 4000 enterprises worldwide to increase their cyber security posture. This has made iboss one of the fastest growing cyber security companies in the market. iboss is trusted by thousands of organizations and millions of users worldwide. Our customer-centric focus is demonstrated by an industryleading customer retention rate of over 98.5%. iboss Solutions Highlights Ground-breaking FireSphere targeted attack defense including exclusive network baselining for anomaly detection Unparalleled inbound/ outbound visibility across all data channels Granular application control designed for today s application-intensive environments Unmatched protection for borderless networks, covering BYOD, MDM and the Cloud Accelerated speed to response that translates network events into actionable threat intelligence Low TCO with unrivaled easeof-use and world-class support Our Products Advanced Defense Against APTs and Evasive Infections Flexible Deployment Options Next-gen Web and Application Security for the borderless network On-Premises Cloud Hybrid Mobile Security for the Borderless Network

Advanced APT Defense Prevents Targeted Attacks and Detects Evasive Infections to Reduce Data Exfiltration As countless high-profile data breaches demonstrate, stopping 100% of advanced malware is unrealistic. That s why iboss created FireSphere, the ground-breaking APT and evasive infection defense that not only secures organizations against APTs, criminal malware, and other advanced threats, it also detects and responds to infections on your network in real-time to reduce data exfiltration. No other security solution combines FireSphere s advanced, proprietary features. Network Baselining for Anomaly Detection FireSphere Highlights Superior threat protection that combines both signatureless malware defense and infection detection at the gateway Comprehensive analysis of suspicious files with behavioral sandboxing in the cloud, or onpremises, including auto-deposit and on-demand functionality Unrivaled protection against data exfiltration with anomaly detection through network baselining, a feature no one else offers Actionable intelligence with fewer alerts and false positives via the CISO Command Center and the Threat Intelligence Cloud Intrusion defense with content-aware DNS, SSL and data inspection BYOD and heterogeneous device protection with auto-quarantine of high-risk devices and users Detecting infections on the network is becoming increasingly difficult as sophisticated malware exploits use evasive maneuvers to mask communication. FireSphere Network Anomaly Detection goes beyond monitoring C&C (command and control) communication to incorporate advanced technology that continuously monitors and compares your current network traffic to pinpoint unusual behavior, indicating your network has been compromised. FireSphere baselining technology was developed and patented by iboss and we are the only security vendor to integrate this advanced capability into our data defense solution. It leverages iboss visibility across all data channels and ability to maintain over a TB of historical event logs, to establish a baseline for normal network traffic. It then monitors data movement on a variety of parameters such as the volume of bytes in or out, the number of connections being attempted, the intended geo-destination and others, to compare traffic and detect anomalies. Once a problem is revealed, the data transfer is stopped, giving you time to investigate and remediate to prevent data exfiltration. Behavioral Sandboxing Auto Deposit and On-Demand FireSphere Sandboxing isolates and executes suspicious files in a safe environment to deliver in-depth analyses of complex malware and polymorphic viruses. This proprietary features scans all traffic and auto-deposits suspicious files, or use the exclusive on-demand option to add objects manually. CISO Command Center FireSphere s exclusive CISO Command Center provides instant and comprehensive visibility into threats and infections, with real-time threat intelligence from FireSphere and the iboss Threat Intelligence Cloud. The results are correlated across a wide range of parameters, giving you instant, actionable forensic intelligence on zero-day threats and evasive malware. Getting hundreds of alerts from one piece of malware generating multiple callbacks could quickly overwhelm your resources. FireSphere translates events into actionable intelligence, with technology that compiles and correlates threat intelligence to deliver prioritized alerts, allowing you to respond immediately, without wasting valuable IT resources. Threat Intelligence Cloud FireSphere allows you to stay ahead of polymorphic malware and APTs by collecting global threat intelligence in the cloud, from millions of iboss endpoints and over 55 advanced global malware engines and correlating it to deliver comprehensive zero-day threat information to the CISO Command Center.

Web Security Highlights Web and Application Security Outbound Visibility across All Ports Traditional Web security solutions were designed to focus on HTTP/ HTTPS traffic across ports 80 and 443, but cybercriminals are using hidden UDP channels to distribute data-stealing malware. Only iboss technology gives you visibility and control over all inbound/outbound data channels and all protocols on your network, including streaming data across all 65,535 UDP ports that other solutions can t see. And iboss technology has the ability to stop UDP data transfers mid-stream, preventing dangerous malware from reaching your network. No other solutions offer this level of advanced Web and Application protection. Watching only standard ports creates a blind spot for outbound data loss Port 80 Port 443 HTTPS/SSL Traffic Scanning Organizations depend on HTTPS/SSL encryption to protect sensitive data as it leaves and enters the network, but today s advanced threats are often hiding in SSL traffic. Most security solutions that claim they scan and decrypt SSL, do so at the gateway, which can create latency, open security holes and leave you vulnerable to man-in-the-middle (MiTM) attacks. iboss proprietary technology scans SSL traffic at the individual workstation, which retains data integrity throughout the transmission, while eliminating network bottlenecks and preventing dangerous MiTM attacks. In addition, the iboss proprietary approach allows you to set policies to enable selective SSL decryption, offering the advantage of letting innocuous transmissions pass-by, while decrypting suspicious or sensitive data transfers as needed. Advanced Application iboss proprietary application scanning with deep packet inspection secures the gateway from unwanted applications and threats, with multi-layered security that includes torrent and file-sharing protection, dynamic proxy circumvention detection, advanced protocol management and trigger-based alerts. iboss advanced signatures and heuristics combined with stream-based blocking capabilities assure that even complex applications running on stateless UDP protocols are inspected and blocked at the gateway. Intelligent Bandwidth /QoS Advanced threat defense with visibility into hidden ports standard solutions don t see Protection from circumvention attempts and MiTM attacks with advanced SSL defenses including selective decryption Application control with granular, content-aware application management Network availability ensured with Intelligent Bandwidth Borderless network protection with BYOD controls Integrated single pane-of-glass reporting across all devices and users on or off-premises iboss Intelligent Bandwidth assures maximum network efficiency with flexible stream-based technology that is directory-aware, enabling granular control of bandwidth during peak usage hours. Unlike standard stateful shaping technology, which continuously applies policy per domain or IP, iboss binds directory services to bandwidth policies, enabling dynamic throttling that supports critical business processes while maintaining optimal network performance. BYOD (bring your own device) The iboss Secure Web Gateway integrates BYOD management to extend advanced threat protection and DLP to all the BYOD users on your network, while ensuring increases in bandwidth demand don t affect mission critical traffic. iboss also identifies BYOD users not using a NAC and provides a captive portal that binds them to your network directory or LDAP automatically, assuring accurate policy enforcement across all users, whether on wired or wireless devices. iboss BYOD tools include advanced application controls and High Risk Auto Quarantine, enabling you to lock users engaged in high-risk online behavior.

Mobile Security Highlights Cloud Web Security and integrated MDM The evolution of mobile connectivity has changed the modern workplace, creating more productivity and efficiency, but also increasing security challenges. iboss MobileEther easily enables your mobile workforce with seamless cloud integration and proprietary mobile device management (MDM). Integrated Cloud Web Security MobileEther is the only security solution that integrates robust Web Security with full-featured mobile device management (MDM) to deliver advanced protection of users, devices and your network. iboss streamlined, one-click authentication allows you to deploy Web security features seamlessly on any mobile device to ensure your security policies are enforced, whether on or off the network. MobileEther also provides granular application, social media and SaaS controls that govern user activities and are integrated with iboss comprehensive reporting and the real-time threat and bandwidth dashboards. Seamless integrated Cloud Web Security and proprietary Mobile Device Advanced Web Security features delivered across all mobile users in one-click Full-featured, proprietary MDM that protects mobile devices and the network Streamlined authentication for accurate policy enforcement regardless of user location Proprietary Mobile Device MDM features include remote wipe of lost or stolen devices, removal of unapproved apps, disabling of device functions such as cameras and more. You can locate devices with geomapping, remotely scan and selectively wipe them and lock or push apps. Email trigger alerts provide insight on events, such as a device leaving the network, unapproved apps or policy violations. If you already have an MDM solution, MobileEther can be installed with MDM disabled. Threat and Event Console Reporting The exclusive iboss Threat and Event Console delivers integrated, single pane of glass visibility across all iboss Web Security, FireSphere Advanced APT Defense and Mobile Security solutions. It boasts a highly-responsive, intuitive interface, guided interactive wizards, and customizable reporting templates. Within seconds, go from organization-wide visibility, to a 360-degree view of each network user, including Web activity, application use, bandwidth consumption, threats and more. Threat and Event Console Highlights Real-time intelligence with Live Threat Dashboard Optimal network performance with Live Bandwidth Dashboard and Dynamic Plotter Location-aware visibility with GeoMapping and HeatMap Technology Validation of policy violations with unique Desktop Activity Recorder Accurate compliance and AUP enforcement with comprehensive Web Security reporting Dynamically indexed data logs for unrivalled detect and respond capabilities to reduce data exfiltration

Why organizations choose iboss iboss leads the industry in protection against targeted attacks and holds over 60 patents and patents pending for our cutting-edge technology. Here are some key differentiators demonstrating iboss leadership in the cyber security industry: Behavioral Data Anomaly Detection iboss is the only security vendor offering patented technology that reduces data exfiltration by monitoring how network data behaves and detecting anomalies in that behavior. Integrated Gateway Security iboss solutions are built on streambased technology that delivers visibility across all non-standard ports and protocols, to detect and respond to network traffic anomalies and eradicate evasive malware other gateway solutions miss. Dual Behavioral Sandboxing iboss FireSphere includes proprietary behavioral sandboxing that auto-deposits suspicious files for in-depth analysis and includes an on-demand option. Correlated Global Threat Intelligence iboss correlates global cloud threat intelligence in real-time to translate events into actionable intelligence, reducing alerts and false positives. Our faster, more comprehensive reporting makes good admins better and the best admins faster. Location-Based Policy Enforcement iboss patented technology enables enforcement of regulatory and security policy requirements, for individuals and groups, across all devices whether on or off the network. Advanced SSL Security Exclusive, patented selective decryption eliminates latency typical of other solutions, while increasing the security, performance and scalability required to analyze encrypted streams Flexibility and Scalability iboss technology was developed with infinite scalability capable of handling even the largest and most bandwidth-intensive deployments. In addition, iboss solutions are the easiest to deploy and manage, conserving valuable IT resources. Comprehensive Interoperability iboss advanced solutions can be deployed as standalone products or easily integrated into your current deployments to lower TCO while increasing your security posture. Concierge Technical Support Staffed by IT Engineers We offer 24/7/365 technical support from experienced network engineers, who guide even the most complex solution deployments. Unrivalled Customer Satisfaction iboss security solutions protect thousands of organizations and millions of users globally and has delivered a customer retention rate of 98.5% for the last 3 years. iboss Cybersecurity Offices: NORTH AMERICA East Coast: Florida 550 W. Cypress Ave #470 Fort Lauderdale. FL 33309 11825 High Tech Avenue Suite 200 Orlando. FL 32817 West Coast: San Diego Corporate Office 9950 Summers Ridge Rd. #160 San Diego. CA 92121 Irvine 5 Park Plaza. Suite 350 Irvine. CA 92614 UNITED KINGDOM ICS House. 3rd Fl. Suite 3.2 Hall Road. Maldon. Essex. CM9 4LA United Kingdom Email: emeia@iboss.com PB-US-01/15 LATIN AMERICA Arenales 3648 8 B Buenos Aires. Argentina (1425) Email: latin@iboss.com