Blog for

General

popular topics:

network security cloud security SASE reporting Cloud Adoption zero-trust backhaul secure Internet GDPR compliance virtual desktop infrastructure (VDI) internet access speed cloud connector agent Ransomware network perimeter Zero Trust Network Access packet capture on-prem web proxy appliances plan Redirect YouTube Security Information and Event Management (SIEM) Microsoft Cloud App Security (MCAS) Switching to iboss MDM CASB SD-WAN REvil Kayesa executive order cyber hygiene subscription objects primitives rules conditions risk dashboard cloud connected inventory count Restricted Mode Allow List override block pages country block file uploads iOS iPad Safari Google Classroom Chromebook ChromeOS keyword filter Android Always-on VPN Lockdown mode Wessex Water Rapid deployment cloud-based web security security layers migration to the cloud SIEM Data security Remote device security Cloud Access Security Broker block Dropbox block OneDrive block box.com block Google Drive Reports logs event viewer timeframe callout scheduling reports dashboard IPSec GRE dedicated IP WCCP Tunneling log tuning Block YouTube HD Microsoft Azure Secured Virtual Hubs Microsoft Virtual Hubs VirtualHubs Internet Security Azure Secured Virtual Hubs iboss platform version FireEye Cloud PAC script Apple TLS Apple SSL Knowledgebase Knowledge base GeoZone 9.8.27 malware cloud-hosted ISO standards throttle video UI GUI user interface UX Next Generation User Interface Faster page loads Instant Search Autosuggestion admin console next-gen cloud admin console EA Sports Data Breach Colonial Pipeline JBS Healthcare HIMSS Microsoft 365 Microsoft partnership reverse proxy API CASB Remote Browser Isolation RBI Cybersecurity Awareness Month cybersecurity awareness Be Cyber Smart FedRAMP ATARC Cybersecurity civil cyber fraud vulnerabilities DLP Data Loss Prevention Cloud App Isolation Exact Data Match Defenders Network Behavior crisis management NIST Apache Log4j Log4Shell Threat Landscape Cyber Threats hackers
January 10, 2024
Optimizing Compliance and Security: iboss Integrates with CISA’s Protective DNS for Enhanced Government Defense
In the ever-evolving cybersecurity landscape, where threats multiply and diversify daily, government agencies find themselves in a...
September 29, 2023
Enhancing Digital User Experience in the Age of Cloud Applications: A Look at iboss Digital Experience Management
In today's era of rapid digital transformation, business-critical applications are increasingly cloud-based. While the shift to the...
September 19, 2023
Solving Modern Azure Migration Challenges: iboss’ Azure Cloud Security Gateways
Organizations are migrating their infrastructure to the cloud in the fast-paced digital landscape. As enterprises make this...
February 27, 2023
CISA Urges Increased Vigilance One Year After Russia’s Invasion of Ukraine
In response to the CISA alert urging increased vigilance one year after Russia’s invasion of Ukraine, organizations...
January 23, 2023
Browser Isolation: The Zero Trust VDI Replacement
Accessing customer data is an essential part of the customer service experience. However, when Call Center agents...
June 23, 2022
Zero Trust: The glue that holds everything together
A holistic approach to Zero Trust can provide a multitude of benefits, including preventing malware from entering...