Product Packaging

Choose the iboss plan that’s right for you

The Distributed Gateway Platform that redefines the way cybersecurity is delivered and managed

  • Flexible: Built for the cloud with a unified, distributed architecture
  • Robust: Powerful rapid detection and response capabilities to reduce breach dwell time
  • Scalable: Easily upgrade at any time if your bandwidth increases or capability requirements change
  • Predictable: 100% SaaS subscription so you never have to buy SWG appliances again

Superior protection delivered with flexibility and choice – that’s the iboss difference.

For pricing information, please contact sales.

Contact Sales

pricing-header.jpg
 

SMALL

For networks under 50 Mbps at Headquarters

MEDIUM

For networks under 1 Gbps at Headquarters

LARGE

For networks over 1 Gbps at Headquarters

iboss Distributed Gateway Platform
Cloud Gateways
Optional Local Gateways  
Cloud Reporting Storage 35 GB 1.4 TB 14 TB

 

Click on the expand (+) icon for more details across packages.

CORE

Essential web gateway features for both on- and off-network devices

ADVANCED

Core package features plus advanced threat protection and more

PREMIUM

Advanced package features plus additional packet-based capabilities

Complete web & content filtering
Stream-based protection, including all ports and protocols (TCP & UDP)
Granular category and user-based filtering
Trigger-based alerts on keywords and events in real-time  
File extension, domain extension, and content MIME type blocking  
Port access management  
Dynamic real-time URL database  
Compliant with industry regulations for data privacy and protection
HIPAA certified with Business Associates Agreement (BAA)
CIPA compliant content filtering for students and staff
SSL traffic management
Fastest, most scalable SSL decryption available
Microsegmentation to selectively decrypt based on content, device, user, or group
Cloud Application and Social Media Controls
Advanced application scanning and deep packet inspection (DPI)
Content-aware management of social media applications like Facebook, Twitter, LinkedIn, and Pinterest
Granular control over evasive cloud applications like TOR, BitTorrent, SnapChat, Skype and more
Safe Search Enforcement for Google, Bing, and Yahoo
Clean Image Search and Translation Filtering for Google Services
Mobile device protection
Complete content filtering for iOS, Android, and Chromebook devices
BYOD & Guest Wi-Fi Policy Management
Protection for out of date browsers and operating systems
Browser end-of-life (EOL) Protection
Operating System end-of-life (EOL) Protection
Advanced, real-time reporting
Comprehensive, drill-down reports
Live, historical, and statistical reports
Report scheduling & customization
Instantly pinpoint and lock users attempting to circumvent security via evasive protocols
Event searching
Auto-triggered Video Desktop Recorder (DMCR)
Native Splunk integration
SIEM integration for forensic-level reporting
Centralized management and administration in the cloud
Cloud-based admin console with responsive web UI
Complete bi-directional policy management
Seamless directory integration and group management
System delegated administrators and reporting groups
Location-based policies
Custom branding on end user sign in and block pages
Flexible data traffic redirection for any device, anywhere
Protection for Windows, Mac, iOS, Android, Chromebook, and Linux devices
Standard Support    
12-hour phone support
Signature-based malware prevention & breach detection  
Malware identification and mitigation from best-of-breed signature databases and proprietary iboss malware registry  
Up-to-the-minute threat information with synchronous database updates  
Command and Control (CnC) callback monitoring across all ports and protocols  
Domain, URL, and blacklisted IP monitoring  
Geolocation for callback origin identification  
Passive Sandboxing via the iboss cloud  
Real-time auto-deposit of user downloaded files using signatures generated from behavioral sandboxing analysis  
Blended AV Scanning  
SDN integration for threat isolation  
Infected machine auto-locking to block internet communication and quarantine internal outbreaks  
Global cloud threat intelligence to analyze and predict threat behavior  
Crowd-sourced threat intelligence for signatures and samples  
Malware origin and behavior pattern investigation  
Time-saving Incident Response Center  
Real-time malware detection for prioritized response  
Translation and prioritization of security event logs into incidents, reducing noise  
Actionable to-do list for remediation and auditing of top security incidents  
High risk/ infected user and device identification  
Deep forensic analysis to reduce false positives  
Identification of IP aliases and malicious hosted files  
Dwell time infection measurement  
Snapshot of global historic outbreaks  
Network Bandwidth Optimization  
Intelligent policies shape traffic only when needed  
Up-to-the-second network bandwidth information with packet-level detail  
60 pre-defined categories make identifying and shaping traffic easy  
Live dynamic bandwidth dashboard and plotter  
Network directory workgroup integration  
Granular reporting and control capabilities  
Historical network activity feeds  
Intrusion detection & prevention (IDPS)    
Real-time intrusion, malware, and virus protection    
Quickly and easily view event detail, including source & destination IP    
Automatic signature threat feed subscriptions    
Category-based malware rules    
Visual rule creation & editing    
Ultimate data hijacking protection    
Automatic containment of infectious malware to ensure data cannot be exfiltrated out of your network    
Full-stream protection, including both TCP and UDP ports    
Simple configuration with out-of-the-box policy templates, or tailored setup with customized rules    
Data flow restrictions by country, organization, or subnet    
Configurable thresholds based on data quantity or connection count    
Real-time alerts for suspicious behavior    
Network baselining for anomaly detection    
Packets, bytes, and connections are continually monitored to establish baselines for normal network traffic behavior over all 131K data channels    
Anomaly behavior is automatically detected and stopped before loss occurs    
Policy templates for high risk countries and weekday/weekend behavior makes setup simple    
Network baselines determined by a running average or a user-defined golden baseline    
Real-time alerts and drill down forensics for anomalous traffic    

Sandboxing

Mobile Device Management

Cyber Risk Scoring

Indexing

Detection and controlled detonation of suspicious files to prevent unidentified, polymorphic malware. Monitor, manage, and secure mobile devices anywhere, anytime. Real-time scoring of high-risk users and devices within your network. Augments reporting capabilities by storing and indexing event logs for fast, scalable searching. 

 

 

Premier Support

Mission Critical Support

24/7 access to technical experts and shorter escalation response times. 24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs.

 

 

Interested in learning more about the Distributed Gateway Platform?

Download the data sheet for more information, or contact sales if you’d like a demo or pricing information.