Visionary
Breakthrough.

iboss is the only company named a Visionary in the 2017 Gartner Magic Quadrant for Secure Web Gateways.

 

DOWNLOAD THE REPORT NOW »

Packaging

Choose the iboss Plan That’s Right for You

The Distributed Gateway PlatformTM that redefines the way cybersecurity is delivered and managed

 

Flexible: Built for the cloud with a unified, distributed architecture

 

Robust: Powerful rapid detection and response capabilities to reduce breach dwell time

 

Scalable: Easily upgrade at any time if your bandwidth increases or capability requirements change

 

Predictable: 100% SaaS subscription so you never have to buy SWG appliances again

 

 

Superior protection delivered with flexibility and choice – that’s the iboss difference.

Step One – Specify Your Network Size

The first step in selecting the right iboss solution is to specify your network size, based on bandwidth at your main office, data center, or headquarters.

 

 

SMALL

For networks under 50 Mbps at headquarters

MEDIUM

For networks under 1 Gbps at headquarters

LARGE

For networks over 1 Gbps at headquarters

iboss Distributed Gateway Platform
Cloud Gateways
Optional Cloud-Delivered Physical Gateways 
Cloud Reporting Storage35 GB1400 GB1400 GB
12-hour LIVE Support

Step Two – Choose a Plan

The next step is to choose the gateway cybersecurity features your organization needs.

 

Click on the expand (+) icon for more details across packages.

CORE

The most advanced core web gateway features delivered consistently to all users regardless of their location

ADVANCED

Core package features PLUS advanced malware defense and more

PREMIUM

Advanced package features PLUS deep file-based data loss prevention capabilities

Complete web & content filtering
Stream-based protection, including all ports and protocols (TCP & UDP)
Granular category and user-based filtering
Trigger-based alerts on keywords and events in real-time 
File extension, domain extension, and content MIME type blocking 
Port access management 
Dynamic real-time URL database 
Compliant with industry regulations for data privacy and protection
HIPAA certified with Business Associates Agreement (BAA)
CIPA compliant content filtering for students and staff
SSL traffic management
Fastest, most scalable SSL decryption available
Microsegmentation to selectively decrypt based on content, device, user, or group
Cloud application and social media controls
Advanced application scanning and deep packet inspection (DPI)
Content-aware management of social media applications, like Facebook, Twitter, LinkedIn, and Pinterest
Granular control over evasive cloud applications, like TOR, BitTorrent, SnapChat, Skype, and more
Safe Search Enforcement for Google, Bing, and Yahoo
Clean Image Search and Translation Filtering for Google Services
Mobile device protection
Complete content filtering for iOS, Android, and Chromebook devices
BYOD & guest Wi-Fi policy management
Protection for out-of-date browsers and operating systems
Browser end-of-life (EOL) protection
Operating system end-of-life (EOL) protection
Advanced, real-time reporting
Comprehensive, drill-down reports
Live, historical, and statistical reports
Report scheduling and customization
Instantly pinpoint and lock users attempting to circumvent security via evasive protocols
Event searching
Auto-triggered Video Desktop Recorder (DMCR)
Native Splunk integration
SIEM integration for forensic-level reporting
Centralized management and administration in the cloud
Cloud-based admin console with responsive web UI
Complete, bi-directional policy management
Seamless directory integration and group management
System-delegated administrators and reporting groups
Location-based policies
Custom branding on end-user sign-in and block pages
Flexible data traffic redirection for any device, anywhere
Protection for Windows, Mac, iOS, Android, Chromebook, and Linux devices
Signature-based malware prevention & breach detection 
Malware identification and mitigation from best-of-breed signature databases and proprietary iboss malware registry 
Up-to-the-minute threat information with synchronous database updates 
Command and Control (CnC) callback monitoring across all ports and protocols 
Domain, URL, and blacklisted IP monitoring 
Geolocation for callback origin identification 
Behavioral Malware Sandboxing Defense 
Real-time auto-deposit of user downloaded files using signatures generated from behavioral sandboxing analysis 
Blended AV scanning 
SDN integration for threat isolation 
Infected machine auto-locking to block internet communication and quarantine internal outbreaks 
Global cloud threat intelligence to analyze and predict threat behavior 
Crowd-sourced threat intelligence for signatures and samples 
Malware origin and behavior pattern investigation 
Time-saving Incident Response Center  
Real-time malware detection for prioritized response 
Translation and prioritization of security event logs into incidents, reducing noise 
Actionable to-do list for remediation and auditing of top security incidents 
High risk/infected user and device identification 
Deep forensic analysis to reduce false positives 
Identification of IP aliases and malicious hosted files 
Dwell time infection measurement 
Snapshot of global historic outbreaks 
Intrusion detection and prevention 
Real-time intrusion, malware, and virus protection 
Quickly and easily view event detail, including source and destination IP 
Automatic signature threat feed subscriptions 
Category-based malware rules 
Visual rule creation and editing 
Deep file-based data loss prevention capabilities  
Detect, alert, and stop the transfer of sensitive data to and from the cloud  
Provides protection against unauthorized cloud use  
Advanced detection capabilities to detect sensitive information within content  
Screen content to prevent unintended loss of sensitive information  
Capable of scanning for Credit card numbers, email addresses, and other Personally Identifiable Information (PII).  
Advanced Content Analysis Engines  
Process and parse targeted files, ensuring that even compressed content is accessible to the detection engines  
Set compressed file max scan depth to search for content deep within zip files  
Analyzes numerous file types including PDF, Zip Files, and Outlook data files.  

Choose Optional Additional Features

Each of these feature options can be added to any plan. Contact sales for more information.

 

BANDWIDTH OPTIMIZATION

Intelligent bandwidth shaping to ensure network performance.

NETWORK ANOMALIES

Automatically detects anomalous behavior, contains the malware that is causing it, and stops the activity before data loss occurs.

MOBILE DEVICE MANAGEMENT

Monitor, manage, and secure mobile devices anywhere, anytime.

CYBER RISK SCORING

Real-time scoring of high-risk users and devices within your network.

INDEXING

Augments reporting capabilities by storing and indexing event logs for fast, scalable searching.

PREMIER SUPPORT

24/7 access to technical experts and shorter escalation response times.

MISSION CRITICAL SUPPORT

24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs.

 

For pricing information, please contact sales.

Contact Sales