Skip to end of metadata
Go to start of metadata

As increasing numbers of end-users access the Internet, not just for reference or recreation, but as a working environment, the need to secure cloud traffic in real-time has become a vital need for nearly all end-users, the companies that employ them, the vendors and OEM partners that offer web-based services.

Our cloud-based security services include Web Security service, which monitors massive amounts of web traffic to ensure end-users surf and use the Internet according to the policies and rules created by their employers and service providers. The technology on which it is based uses comprehensive data sources to:

  • Protect end-users from malicious sites.
  • Protect users in offices, roaming users, and those accessing the web via mobile devices.
  • Enable customers to increase employee productivity.
  • Improve the overall end-user surfing experience.

By taking full advantage of the depth and breadth of resources, Web Security provides the broadest coverage and most accurate URL categorization in real-time latencies.

The Web Security service offers reduced risk, greater reliability, is fully scalable, and requires no additional IT overhead.

Customer Administrators can control and monitor the Web Security service via a convenient web-based interface that contains the following main options:

More and more, companies are moving to cloud-based technologies because this enables them to easily deploy new services while providing their users with real-time, scalable, updated services etc. Our cloud-based security protects corporate Internet traffic for all associated users regardless of the source. This means it protects users in offices, roaming users, and those accessing the web via mobile devices. By directing all web-based traffic to our cloud scanning services, organizations receive the following benefits:

  • Minimal local hardware/software installation requirements.
  • Lower IT costs because the IT department can focus activity on defining and creating corporate policies rather than configuring and maintaining hardware and software resources.
  • All responsibility of uptime, upgrades and operational maintenance are provided by the vendor.
  • Provides customers with the ability to create and apply rules-based policies to end-users, groups, locations, etc.
  • Enables customers to provide their end-users with a safe user experience while they surf and work both in and out of the office, from their desktop computer, laptop, or mobile device.
  • Inherent resiliency, HA, DRP, multi-site support, elastic scalability and a web-based user interface for monitoring, managing, and configuring the service.

The Web Security Cloud processes over 10 billion transactions per day. While issuing real-time responses to URL and spam queries from millions of endpoints, it warehouses threat-related spam, malware, virus and URL filtering data from Web and email traffic. The Web Security service's Cloud comprises numerous fully redundant data centers/satellite sites which connect a vast global collection and delivery network with distributed load balancing and query management. This global network infrastructure has been operating and servicing organization worldwide with no outages for over a decade.

Once your organization has redirected its web traffic through the Web Security cloud, your end-users' web traffic is quickly scanned with advanced URL filtering and antivirus engines to provide comprehensive web protection. Near-zero latency, high availability, and on-demand scalability supporting distributed organizational structures and roaming users are key architectural requirements for the Web Security service.

Deployment and implementation can be done rapidly using the instructions in this document.

  • No labels