{"id":456,"date":"2014-03-17T15:36:52","date_gmt":"2014-03-17T08:36:52","guid":{"rendered":"http:\/\/www.solution-one.net\/wpweb\/?page_id=456"},"modified":"2014-03-17T15:57:06","modified_gmt":"2014-03-17T08:57:06","slug":"iboss-web-security-gateway","status":"publish","type":"page","link":"https:\/\/www.solution-one.net\/wpweb\/?page_id=456","title":{"rendered":"iBoss Web Security Gateway"},"content":{"rendered":"<h4><span style=\"color: #339966;\"><strong>Ensure Regulatory Compliance: CIPA and HIPAA<\/strong><\/span><\/h4>\n<p><strong>Issues:<\/strong> It\u2019s become increasingly more difficult to manage networks by filtering URLs. With the emergence of Web 2.0 and HTTPS, as well as the onslaught of mobile devices and BYOD which have become a big part of day-to-day operations, it\u2019s become imperative to secure networks beyond simply the wired devices. In addition, generic reporting of URL access fails to provide complete insight on the network resources utilized, and it lacks the ability to pinpoint the latest threats.<\/p>\n<p><strong>Solution:<\/strong> To address the \u201cnew Web,\u201d iboss Secure Web Gateway secures all aspects of Internet traffic including web filtering, SSL access, applications, bandwidth throttling\/QoS, on\/off-premise mobile security, and BYOD management tools all of which are combined with best-of-breed network threat and reporting dashboards in one solution. This comprehensive security suite gives you the tools you need to secure all aspects of Internet traffic. By inspecting across 65,535 ports, iboss tracks and manages applications such as Web Ex and Google Docs, including SSL on nonstandard ports while providing unmatched network insight. All iboss filters include the iboss Threat &amp; Event Console for unmatched packet level insight.<\/p>\n<div>\n<div>\n<h4><span style=\"color: #339966;\">Application, HTTPS, Web 2.0<\/span><\/h4>\n<p>Web 2.0 introduced the need to protect traffic outside standard Port 80 and 443. New applications such as torrents, annonymizers, and chat applications such as Yahoo and Google Chat must use nonstandard ports for communication. Securing these ports ensures network compliance and reduces threat exposure while enforcing the organization\u2019s acceptable use policies (AUP).<\/p>\n<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"Layer 7 Port Security Secures all 65,535 ports\" alt=\"Layer 7 Port Security Secures all 65,535 ports\" src=\"http:\/\/www.iboss.com\/images\/layer_7_port_security.png\" width=\"606\" height=\"261\" \/><\/div>\n<\/div>\n<div>\n<div>\n<h4><span style=\"color: #339966;\">iboss Secure Web Gateway Combines:<\/span><\/h4>\n<ul>\n<li>Web Security (HTTP\/S)<\/li>\n<li>Scanning Inside SSL<\/li>\n<li>Layer 7 Application Management DPI\/Heuristics\/Signatures<\/li>\n<li>BYOD Management- Authentication, Bandwidth, High Risk Quarantine<\/li>\n<li>Mobile Security &#8211; On\/Off Premise Security<\/li>\n<li>Bandwidth Throttling and QoS<\/li>\n<li>Integrated Threat &amp; Event Console<\/li>\n<\/ul>\n<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"iboss Reports\" alt=\"iboss Reports\" src=\"http:\/\/www.iboss.com\/images\/screenshots\/reporter_2_smaller.jpg\" width=\"301\" height=\"301\" \/><\/div>\n<\/div>\n<div>\n<div>\n<h4><span style=\"color: #339966;\">Identify Threats &amp; Report Traffic<\/span><\/h4>\n<p>iboss Secure Web Gateway contains the powerful iboss Threat &amp; Event Console to provide best-of-breed network reporting, forensic search abilities, and drill-down detail of all network traffic. The iboss Threat &amp; Event Console provides dynamic real-time threat dashboards to pinpoint threats, bandwidth usage, and user activity. It also includes the Bandwidth Plotter, so administrators can track bandwidth consumption through a bandwidth plotter and heat map charts, plus search functions to track individual connections. The proprietary Global Geotagging Map over IP provides live visual insight on where network traffic is originating from, across the globe.<\/p>\n<\/div>\n<div><img decoding=\"async\" class=\"aligncenter\" title=\"Identify Threats. Report Traffic\" alt=\"Identify Threats. Report Traffic\" src=\"http:\/\/www.iboss.com\/images\/screenshots\/bandwidth_dashboard_1_thumb.jpg\" \/><\/div>\n<\/div>\n<div>\n<div>\n<h4><span style=\"color: #339966;\">Protect Network Resources<\/span><\/h4>\n<p>iboss Bandwidth Management delivers control and visibility of network traffic. Flexible policies can be applied to throttle non-critical traffic during peak hours while ensuring that network-critical access is retained. With its real-time bandwidth logs and comprehensive data reports, IT can identify the area of bandwidth usage. Advanced controls allow policies to be set by predefined categories, domain, IP, or TCP\/UDP and then applied to different groups. Management is refreshingly seamless and simple.<\/p>\n<\/div>\n<div><img decoding=\"async\" class=\"aligncenter\" title=\"Protect Network Resources\" alt=\"Protect Network Resources\" src=\"http:\/\/www.iboss.com\/images\/protect_resources2.jpg\" \/><\/div>\n<\/div>\n<div>\n<h4><span style=\"color: #339966;\">Social Media Content Management<\/span><\/h4>\n<p>Expansive social media management options provide \u201cclean\u201d access to YouTube, Google Management Suite and both their services. They also offer Google Clean Image Search and page-content control for social media sites.<\/p>\n<h4><a href=\"http:\/\/www.iboss.com\/docs\/iboss\/updated\/iboss_SWG_Web_Security_Brochure.pdf\"><br \/>\nDownload iBoss Datasheet<\/a><\/h4>\n<p>&nbsp;<\/p>\n<\/div>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/usnQtGzLEzQ\" height=\"411\" width=\"529\" frameborder=\"0\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensure Regulatory Compliance: CIPA and HIPAA Issues: It\u2019s become increasingly more difficult to manage networks by filtering URLs. With the emergence of Web 2.0 and HTTPS, as well as the onslaught of mobile devices and BYOD which have become a big part of day-to-day operations, it\u2019s become imperative to secure networks beyond simply the wired [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-456","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/pages\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=456"}],"version-history":[{"count":22,"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/pages\/456\/revisions"}],"predecessor-version":[{"id":479,"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=\/wp\/v2\/pages\/456\/revisions\/479"}],"wp:attachment":[{"href":"https:\/\/www.solution-one.net\/wpweb\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}