Web Gateways,
Redefined.

Designed for Distributed. Built for the Cloud.
Delivered as a Service.

Packaging

Web Gateway as a Service

 

iboss has completely redefined how the secure web gateway is delivered and managed. No more inopportune hardware purchases or expensive backhauling costs. Through a 100% SaaS model, the iboss. Distributed Gateway Platform provides predictable per user pricing in three convenient packages.

 

Choose the Plan That's Right for You

icon of compliance certifications

Core

Our entry-level offering provides essential web gateway features for on and off network devices, including granular controls and selective SSL decryption.

Probing for Advanced Threats Icon

Malware Defense

The Malware Defense package adds best-of-breed malware signature identification, real-time behavioral sandboxing, as well as a managed, prioritized dashboard for incident and threat response.

Shield Icon of Data Loss Prevention

Data Loss Prevention

The Data Loss Prevention package adds deep, file-based data loss prevention capabilities to detect and stop the transfer of sensitive data to and from the cloud – preventing the loss of PII, financial information, and more.

Want to Learn More? Contact a Sales Representative   Contact Sales

Package Details

Each package includes cloud gateways, advanced real-time reporting, single platform management in the cloud, flexible data redirection across all devices and locations, and live 12-hour support

 

Click on the expand (+) icon for more details across packages.

CORE

MALWARE
DEFENSE

DATA LOSS
PREVENTION

Complete web & content filtering
Stream-based protection, including all ports and protocols (TCP & UDP)
Granular category and user-based filtering
Trigger-based alerts on keywords and events in real-time 
File extension, domain extension, and content MIME type blocking 
Port access management 
Dynamic real-time URL database 
Compliant with industry regulations for data privacy and protection
HIPAA certified with Business Associates Agreement (BAA)
CIPA compliant content filtering for students and staff
SSL traffic management
Fastest, most scalable SSL decryption available
Microsegmentation to selectively decrypt based on content, device, user, or group
Cloud application and social media controls
Advanced application scanning and deep packet inspection (DPI)
Content-aware management of social media applications, like Facebook, Twitter, LinkedIn, and Pinterest
Granular control over evasive cloud applications, like TOR, BitTorrent, SnapChat, Skype, and more
Safe Search Enforcement for Google, Bing, and Yahoo
Clean Image Search and Translation Filtering for Google Services
Mobile device protection
Complete content filtering for iOS, Android, and Chromebook devices
BYOD & guest Wi-Fi policy management
Protection for out-of-date browsers and operating systems
Browser end-of-life (EOL) protection
Operating system end-of-life (EOL) protection
Advanced, real-time reporting
Comprehensive, drill-down reports
Live, historical, and statistical reports
Report scheduling and customization
Instantly pinpoint and lock users attempting to circumvent security via evasive protocols
Event searching
Auto-triggered Video Desktop Recorder (DMCR)
Native Splunk integration
SIEM integration for forensic-level reporting
Centralized management and administration in the cloud
Cloud-based admin console with responsive web UI
Complete, bi-directional policy management
Seamless directory integration and group management
System-delegated administrators and reporting groups
Location-based policies
Custom branding on end-user sign-in and block pages
Flexible data traffic redirection for any device, anywhere
Protection for Windows, Mac, iOS, Android, Chromebook, and Linux devices
Signature-based malware prevention & breach detection 
Malware identification and mitigation from best-of-breed signature databases and proprietary iboss malware registry 
Up-to-the-minute threat information with synchronous database updates 
Command and Control (CnC) callback monitoring across all ports and protocols 
Domain, URL, and blacklisted IP monitoring 
Geolocation for callback origin identification 
Behavioral Malware Sandboxing Defense 
Real-time auto-deposit of user downloaded files using signatures generated from behavioral sandboxing analysis 
Blended AV scanning 
Global cloud threat intelligence to analyze and predict threat behavior 
Crowd-sourced threat intelligence for signatures and samples 
Malware origin and behavior pattern investigation 
Time-saving Incident Response Center  
Real-time malware detection for prioritized response 
Translation and prioritization of security event logs into incidents, reducing noise 
Actionable to-do list for remediation and auditing of top security incidents 
High risk/infected user and device identification 
Deep forensic analysis to reduce false positives 
Identification of IP aliases and malicious hosted files 
Dwell time infection measurement 
Snapshot of global historic outbreaks 
Intrusion detection and prevention 
Real-time intrusion, malware, and virus protection 
Quickly and easily view event detail, including source and destination IP 
Automatic signature threat feed subscriptions 
Category-based malware rules 
Visual rule creation and editing 
Deep file-based data loss prevention capabilities  
Detect, alert, and stop the transfer of sensitive data to and from the cloud  
Provides protection against unauthorized cloud use  
Advanced detection capabilities to detect sensitive information within content  
Screen content to prevent unintended loss of sensitive information  
Capable of scanning for Credit card numbers, email addresses, and other Personally Identifiable Information (PII).  
Advanced Content Analysis Engines  
Process and parse targeted files, ensuring that even compressed content is accessible to the detection engines  
Set compressed file max scan depth to search for content deep within zip files  
Analyzes numerous file types including PDF, Zip Files, and Outlook data files.  

Add-on Features to Fit Your Needs

Each of these feature options can be added to any plan. Contact sales for more information.

 

Additional Features

Supporting Services

BANDWIDTH OPTIMIZATION

Intelligent bandwidth shaping to ensure network performance.

NETWORK ANOMALIES

Automatically detects anomalous behavior, contains the malware that is causing it, and stops the activity before data loss occurs.

PREMIER

24/7 access to technical experts and shorter escalation response times.

MISSION CRITICAL

24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs.
 

 

Web Gateways, Redefined.

Flexible: Built for the cloud with a unified, distributed architecture

 

Robust: Powerful rapid detection and response capabilities to reduce breach dwell time

 

Scalable: Easily upgrade at any time if your bandwidth increases or capability requirements change

 

Predictable: 100% SaaS subscription so you never have to buy SWG appliances again

 

Want to Learn More? Contact a Sales Representative.

 

Contact Sales