Loading...

Manage Security Services

Home/Manage Security Services
Manage Security Services 2017-09-11T06:31:21+00:00

CHOOSE THE SEMNET PLAN THATS RIGHT FOR YOU

Superior protection delivered with flexibility and choice

Step one-Specify Your Network Size

The first step in selecting the right Iboss solution is to specify your Network size,based on the bandwidth at your main office,data centre or headquaters

SMALL

For networks under 50 Mbps at headquarters

MEDIUM

For networks under 1 Gbps at headquarters

LARGE

For networks over 1 Gbps at headquarters

Distributed Gateway Platform
Cloud Gateways
Optional Cloud-Delivered Physical Gateways
Cloud Reporting Storage 35 GB 1400 GB 1400 GB
12-hour LIVE Support

The next step is to choose the gateway cybersecurity features your organization needs.

The three options customers can choose from are:

Core—Essential web gateway features for both on- and off-network devices

Advanced—Core package features plus advanced threat protection and more

Premium—Advanced package features plus behavioral protection, including network anomaly detection

Step Two—Choose Features and Services

Click on the expand (+) icon for more details across packages.

CORE

The most advanced core web gateway features delivered consistently to all users regardless of their location

ADVANCED

Core package features PLUS advanced malware defense and more

PREMIUM

Advanced package features PLUS deep file-based data loss prevention capabilities

Complete web & content filtering
Stream-based protection, including all ports and protocols (TCP & UDP)
Granular category and user-based filtering
Trigger-based alerts on keywords and events in real-time  
File extension, domain extension, and content MIME type blocking  
Port access management  
Dynamic real-time URL database  
Compliant with industry regulations for data privacy and protection
HIPAA certified with Business Associates Agreement (BAA)
CIPA compliant content filtering for students and staff
SSL traffic management
Fastest, most scalable SSL decryption available
Microsegmentation to selectively decrypt based on content, device, user, or group
Cloud application and social media controls
Advanced application scanning and deep packet inspection (DPI)
Content-aware management of social media applications, like Facebook, Twitter, LinkedIn, and Pinterest
Granular control over evasive cloud applications, like TOR, BitTorrent, SnapChat, Skype, and more
Safe Search Enforcement for Google, Bing, and Yahoo
Clean Image Search and Translation Filtering for Google Services
Mobile device protection
Complete content filtering for iOS, Android, and Chromebook devices
BYOD & guest Wi-Fi policy management
Protection for out-of-date browsers and operating systems
Browser end-of-life (EOL) protection
Operating system end-of-life (EOL) protection
Advanced, real-time reporting
Comprehensive, drill-down reports
Live, historical, and statistical reports
Report scheduling and customization
Instantly pinpoint and lock users attempting to circumvent security via evasive protocols
Event searching
Auto-triggered Video Desktop Recorder (DMCR)
Native Splunk integration
SIEM integration for forensic-level reporting
Centralized management and administration in the cloud
Cloud-based admin console with responsive web UI
Complete, bi-directional policy management
Seamless directory integration and group management
System-delegated administrators and reporting groups
Location-based policies
Custom branding on end-user sign-in and block pages
Flexible data traffic redirection for any device, anywhere
Protection for Windows, Mac, iOS, Android, Chromebook, and Linux devices
Signature-based malware prevention & breach detection
Malware identification and mitigation from best-of-breed signature databases and proprietary iboss malware registry
Up-to-the-minute threat information with synchronous database updates
Command and Control (CnC) callback monitoring across all ports and protocols
Domain, URL, and blacklisted IP monitoring
Geolocation for callback origin identification
Behavioral Malware Sandboxing Defense
Real-time auto-deposit of user downloaded files using signatures generated from behavioral sandboxing analysis
Blended AV scanning
SDN integration for threat isolation
Infected machine auto-locking to block internet communication and quarantine internal outbreaks
Global cloud threat intelligence to analyze and predict threat behavior
Crowd-sourced threat intelligence for signatures and samples
Malware origin and behavior pattern investigation
Time-saving Incident Response Center
Real-time malware detection for prioritized response
Translation and prioritization of security event logs into incidents, reducing noise
Actionable to-do list for remediation and auditing of top security incidents
High risk/infected user and device identification
Deep forensic analysis to reduce false positives
Identification of IP aliases and malicious hosted files
Dwell time infection measurement
Snapshot of global historic outbreaks
Intrusion detection and prevention
Real-time intrusion, malware, and virus protection
Quickly and easily view event detail, including source and destination IP
Automatic signature threat feed subscriptions
Category-based malware rules
Visual rule creation and editing
Deep file-based data loss prevention capabilities
Detect, alert, and stop the transfer of sensitive data to and from the cloud
Provides protection against unauthorized cloud use
Advanced detection capabilities to detect sensitive information within content
Screen content to prevent unintended loss of sensitive information
Capable of scanning for Credit card numbers, email addresses, and other Personally Identifiable Information (PII).
Advanced Content Analysis Engines
Process and parse targeted files, ensuring that even compressed content is accessible to the detection engines
Set compressed file max scan depth to search for content deep within zip files
Analyzes numerous file types including PDF, Zip Files, and Outlook data files.

Choose Optional Additional Features

Each of these feature options can be added to any plan. Contact sales for more information

BANDWIDTH OPTIMIZATION

Intelligent bandwidth shaping to ensure network performance.

NETWORK ANOMALIES

Automatically detects anomalous behavior, contains the malware that is causing it, and stops the activity before data loss occurs.

MOBILE DEVICE MANAGEMENT

Monitor, manage, and secure mobile devices anywhere, anytime.

CYBER RISK SCORING

Real-time scoring of high-risk users and devices within your network.

INDEXING

Augments reporting capabilities by storing and indexing event logs for fast, scalable searching.

PREMIER SUPPORT

24/7 access to technical experts and shorter escalation response times.

MISSION CRITICAL SUPPORT

24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs.

 

In addition to these packages, SEMNET offers the following features and services as add-ons to any feature package:

  • Behavioral Sandboxing—Detection and controlled detonation of suspicious files to prevent unidentified, polymorphic malware
  • Mobile Device Management—Monitor, manage, and secure mobile devices anywhere, any time
  • Cyber Risk Scoring—Real-time scoring of high-risk users and devices within your network
  • Premier Support—24/7 access to technical experts and shorter escalation response times
  • Mission Critical Support—24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs

Scalability, On Demand

SEMNET understands that the needs of your business evolve over time, so we’ve made it easy for your cybersecurity to keep pace.If at any time your network demands increase or your feature requirements change, you can seamlessly and instantly add more capabilities and capacity without ever purchasing appliances again—just contact your Account Manager.

Support Options

While all SEMNET deployments include our unmatched 12-hour Standard Support at no additional charge, customers have the option to purchase Premier or Mission Critical Support for even more coverage, including shortened service levelagreements (SLAs) and dedicated Technical Account Engineers.In addition to these packages, SEMNET offers the following features and services as add-ons to any feature package

Behavioral Sandboxing

Detection and controlled detonation of suspicious files to prevent unidentified, polymorphic malware

Mobile Device Management

Monitor, manage, and secure mobile devices anywhere, any time

Cyber Risk Scoring

Real-time scoring of high-risk users and devices within your network

Premier Support

24/7 access to technical experts and shorter escalation response times

Mission Critical Support

24/7 access to technical experts with priority front-of-the-queue access and shortest SLAs

SEMNET SUPPORT PACKAGES                        Standard  Premier  Prestige
Email Support 24 x 7 x 365
OnlineTraining / User Guides
Phone Support
Onsite Support Up to 2 hrs/month  Up to 4 hrs/month
Priority Levels SLA
Level 1 Response Time   6 hours   3 hours   1 hour
Level 2 Response Time   8 hours   4 hours   2 hours
Level 3 Response Time 12 hours   6 hours   6 hours
  Please contact us for pricing

REQUEST DEMO