Visionary
Breakthrough.

iboss is the only company named a Visionary in the 2017 Gartner Magic Quadrant for Secure Web Gateways.

 

DOWNLOAD THE REPORT NOW »

Packaging

Choose the iboss Plan That’s Right for You

The Distributed Gateway PlatformTM that redefines the way cybersecurity is delivered and managed

 

Flexible: Built for the cloud with a unified, distributed architecture

 

Robust: Powerful rapid detection and response capabilities to reduce breach dwell time

 

Scalable: Easily upgrade at any time if your bandwidth increases or capability requirements change

 

Predictable: 100% SaaS subscription so you never have to buy SWG appliances again

 

 

Superior protection delivered with flexibility and choice – that’s the iboss difference.

Step One – Specify Your Network Size

The first step in selecting the right iboss solution is to specify your network size, based on bandwidth at your main office, data center, or headquarters.

 

 

SMALL

For networks under 50 Mbps at headquarters

MEDIUM

For networks under 1 Gbps at headquarters

LARGE

For networks over 1 Gbps at headquarters

iboss Distributed Gateway Platform
Cloud Gateways
Optional Local Gateways 
Cloud Reporting Storage35 GB1.4 TB14 TB

Step Two – Choose a Plan

The next step is to choose the gateway cybersecurity features your organization needs.

 

Click on the expand (+) icon for more details across packages.

CORE

Essential web gateway features for both on- and off-network devices

ADVANCED

Core package features plus advanced threat protection and more

PREMIUM

Advanced package features plus additional packet-based capabilities

Complete web & content filtering
Stream-based protection, including all ports and protocols (TCP & UDP)
Granular category and user-based filtering
Trigger-based alerts on keywords and events in real-time 
File extension, domain extension, and content MIME type blocking 
Port access management 
Dynamic real-time URL database 
Compliant with industry regulations for data privacy and protection
HIPAA certified with Business Associates Agreement (BAA)
CIPA compliant content filtering for students and staff
SSL traffic management
Fastest, most scalable SSL decryption available
Microsegmentation to selectively decrypt based on content, device, user, or group
Cloud application and social media controls
Advanced application scanning and deep packet inspection (DPI)
Content-aware management of social media applications, like Facebook, Twitter, LinkedIn, and Pinterest
Granular control over evasive cloud applications, like TOR, BitTorrent, SnapChat, Skype, and more
Safe Search Enforcement for Google, Bing, and Yahoo
Clean Image Search and Translation Filtering for Google Services
Mobile device protection
Complete content filtering for iOS, Android, and Chromebook devices
BYOD & guest Wi-Fi policy management
Protection for out-of-date browsers and operating systems
Browser end-of-life (EOL) protection
Operating system end-of-life (EOL) protection
Advanced, real-time reporting
Comprehensive, drill-down reports
Live, historical, and statistical reports
Report scheduling and customization
Instantly pinpoint and lock users attempting to circumvent security via evasive protocols
Event searching
Auto-triggered Video Desktop Recorder (DMCR)
Native Splunk integration
SIEM integration for forensic-level reporting
Centralized management and administration in the cloud
Cloud-based admin console with responsive web UI
Complete, bi-directional policy management
Seamless directory integration and group management
System-delegated administrators and reporting groups
Location-based policies
Custom branding on end-user sign-in and block pages
Flexible data traffic redirection for any device, anywhere
Protection for Windows, Mac, iOS, Android, Chromebook, and Linux devices
Standard Support  
12-hour phone support, M-F
Signature-based malware prevention & breach detection 
Malware identification and mitigation from best-of-breed signature databases and proprietary iboss malware registry 
Up-to-the-minute threat information with synchronous database updates 
Command and Control (CnC) callback monitoring across all ports and protocols 
Domain, URL, and blacklisted IP monitoring 
Geolocation for callback origin identification 
Passive sandboxing via the iboss cloud 
Real-time auto-deposit of user downloaded files using signatures generated from behavioral sandboxing analysis 
Blended AV scanning 
SDN integration for threat isolation 
Infected machine auto-locking to block internet communication and quarantine internal outbreaks 
Global cloud threat intelligence to analyze and predict threat behavior 
Crowd-sourced threat intelligence for signatures and samples 
Malware origin and behavior pattern investigation 
Time-saving Incident Response Center  
Real-time malware detection for prioritized response 
Translation and prioritization of security event logs into incidents, reducing noise 
Actionable to-do list for remediation and auditing of top security incidents 
High risk/infected user and device identification 
Deep forensic analysis to reduce false positives 
Identification of IP aliases and malicious hosted files 
Dwell time infection measurement 
Snapshot of global historic outbreaks 
Network bandwidth optimization  
Intelligent policies shape traffic only when needed 
Up-to-the-second network bandwidth information with packet-level detail 
60 pre-defined categories make identifying and shaping traffic easy 
Live dynamic bandwidth dashboard and plotter 
Network directory workgroup integration 
Granular reporting and control capabilities 
Historical network activity feeds 
Intrusion detection and prevention  
Real-time intrusion, malware, and virus protection  
Quickly and easily view event detail, including source and destination IP  
Automatic signature threat feed subscriptions  
Category-based malware rules  
Visual rule creation and editing  
Ultimate data hijacking protection  
Automatic containment of infectious malware to ensure data cannot be exfiltrated out of your network  
Full-stream protection, including both TCP and UDP ports  
Simple configuration with out-of-the-box policy templates, or tailored setup with customized rules  
Data flow restrictions by country, organization, or subnet  
Configurable thresholds based on data quantity or connection count  
Real-time alerts for suspicious behavior  
Network baselining for anomaly detection  
Packets, bytes, and connections are continually monitored to establish baselines for normal network traffic behavior over all 131K data channels  
Anomaly behavior is automatically detected and stopped before loss occurs  
Policy templates for high-risk countries and weekday/weekend behavior makes setup simple  
Network baselines determined by a running average or a user-defined golden baseline  
Real-time alerts and drill-down forensics for anomalous traffic  

Choose Optional Additional Features

Each of these feature options can be added to any plan. Contact sales for more information.

 

Sandboxing

Mobile Device Management

Cyber Risk Scoring

Indexing

Detection and controlled detonation of suspicious files to prevent unidentified, polymorphic malware.Monitor, manage, and secure mobile devices anywhere, anytime.Real-time scoring of high-risk users and devices within your network.Augments reporting capabilities by storing and indexing event logs for fast, scalable searching. 

Premier Support

Mission Critical Support

24/7 access to technical experts and shorter escalation response times.24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs.

For pricing information, please contact sales.

Contact Sales