Filter page

Products

Web Application Firewall (WAF)

Enterprise-class Web Application Firewall.

Zenedge

Zenedge

Features

  • Ability to meet appliance PCI DSS requirements
  • Protection against all OWASP Top 10 and / or PCI DSS Requirement 6.5
  • Ability to allow, alert or block web application input based on rules
  • Prevent data leakage or cardholder information
  • Enforce both whitelisting and blacklisting
  • Inspect all web page content, e.g. HTML, DHTML, CSS over HTTP/HTTPS
  • Inspect web services messages, e.g SOAP and XML
  • Defend against direct threats to the Web Application Firewall
  • Support SSL or TLS termination

Description

Zenedge Web Application Firewall (WAF) service is a PCI DSS Compliant robust solution and can be utilized for our customers to comply with PCI DSS by making Requirement 6.6 easy and stress-free for your team. PCI requirement6.6 was designed to directly address the threat against Ecommerce web applications and in general applications capturing credit card numbers. A Web Application Firewall wil not only provide an extra layer of protection against software vulnerabilities that may be inadvertenltly created by the web development tem, but also any inherent software vulnerabilities that may be built into the vendor web application itself, especially zero-day vulnerabilities where the vendor does not have a patch released yet. As a bonus, it’s all that’s required to satisfy PCI DSS 6.6.

Specification

Cloud based, Network Layers 3,4,7. Can do website vulnerability assessments, have template for presenting results.

Download as PDF

DDoS protection

Zenedge

Zenedge

Features

  • Cloud-based best-in-class web application security platform
  • Sophisticated algorithms ready to mitigate complex application-layer attacks
  • Built on a globally distributed Cloud infrastructure with strategically distributed SuperPOP’s
  • White-glove managed service with 24×7 Security Operation Centres
  • Cybersecurity experts at your disposal for real-time mitigation of attacks

Description

Zenedge secures your web sites and web applications at the edge of the Network, away from the perimeter of your data centre, against vulnerabilities and network and application layer DDoS attacks, minimising any potential business disruption.

Specification

Cloud based, Network Layers 3,4,7.

Can do website vulnerability assessments, have template for presenting results.

Download as PDF

Illicit scanner

NetClean provides intelligence solutions to detect, block and analyse digital media to create a safer society.

NetClean

NetClean

Features

ProActive can detect child sexual abuse material on everything from USB flash drives and hard disks to email and Internet traffic.

Description

Specifically to find child pornography on computers (work).

NetClean provides intelligence solutions to detect, block and analyse digital media to create a safer society. It is the leading developer of technical solutions to fight child sexual abuse material. Its solutions are being used worldwide by multinational companies, government agencies, internet service providers, and law enforcement professionals.

Specification

  • Uses only police identified child pornography images, no false positives.
  • Can be Network and/or Endpoint solution.
  • Agent is compatible with Microsoft Windows, Linux and Mac OS X
  • Can block and/or issue an alert in the event of an incident
  • Handles both real-time scans and scheduled scans
  • Configuration control via the NetClean Management Server
  • Automatic updates
  • No end-user interaction
  • Network Agent is easily integrated with your proxy server via ICAP and conducts real-time scans in HTTP traffic in search of illicit images and video files.
  • Can block and/or issue an alert in the event of an incident
  • Appliance is a hardware agent that conducts real-time searches in network traffic in order to identify illicit images and video files but without compromising performance or causing delays.
  • Can block and/or issue an alert in the event of an incident
  • Handles unencrypted TCP- and UDP-based network protocols
  • Supports network speeds of up to 1 Gb/s
  • Supports installation inline or as a network tap
  • Built-in hardware redundancy
  • Configuration and control via the NetClean Management Server
Download as PDF

SiteAdvisor Enterprise (SAE)

Using an intuitive color-coded rating system, McAfee SiteAdvisor Enterprise identifies websites that contain malware or other threats such as spyware or phishing scams, alerting you before you click.

Intel Security

Intel Security

Features

  • Inform end users about the dangers of searching or surfing the Internet.
  • When you search with Google, Yahoo!, MSN, AOL, or Ask.com, a safety rating appears next to each search result.
  • Our color-coded rating system lets users know which websites are safe and which are risky.
  • McAfee SiteAdvisor Enterprise software allows for advanced customization to authorize or block websites based on overall site ratings or threat factors.
  • Use the McAfee Web Filtering for Endpoint module to monitor, control, and report on users’ web surfing to ensure compliance and increase employee productivity.
  • With McAfee ePolicy Orchestrator®  (McAfee ePO™) management console, McAfee SiteAdvisor Enterprise solutions are easy to deploy, manage, and report on across your entire organization.

Description

Keep your business safe without limiting Internet access.

Using an intuitive color-coded rating system, McAfee SiteAdvisor Enterprise identifies websites that contain malware or other threats such as spyware or phishing scams, alerting you before you click.

Get always up-to-date alerts. McAfee Global Threat Intelligence continually scans the Internet with intelligent bots and virtual computers to uncover websites that contain malware.

Gain insight from our email and download tests that inform you if a site contains suspicious links or affiliations to harmful sites.

Ensure policy compliance by authorising or blocking websites, and implementing additional protection for remote users.

Links

Data Sheet 

 Solution Brief

Product Guide 

Best practices 

 ExpertCenter 

 

Download as PDF

Unified Security Service

Censornet USS enables you to monitor and control Web, Email and Cloud Application use to provide complete security for your organisation from one dashboard.

CensorNet

CensorNet

Features

  • Cloud Application Visibility
  • Cloud Application Control
  • Safe anywhere on any device
  • Safe Web Access
  • Email Security
  • Safe from Malware
  • Analytics across email, web and applications
  • Fast and Unobtrusive

Description

Censornet USS enables you to monitor and control Web, Email and Cloud Application use to provide complete security for your organisation from one dashboard. You can protect your employees, whether in the office or mobile, against cyber-attacks, and accidental or malicious leaks of sensitive data. Keeping your organisation safe from from the risks associated with the rapid growth in cloud applications, and the emergence of Shadow IT. USS is a comprehensive cyber security service that combines modules for the security, monitoring and control of web, email and cloud application across your network in one dashboard and logging service, meaning that common policies can be easily applied and incidents tracked across different media. USS provides the security and control of an on-premise or end point component with the flexibility and mobility of a cloud service. It is the next generation in Email and Web security with Cloud Application Control giving you the power to extend web access policies to Bring Your Own Device initiatives and to monitor and control Shadow IT.

Specification

  • Software for Networks
  • Available as a downloadable software, CensorNet’s Cloud Gateway software can be deployed on a virtual server or physical server in less than 30 minutes to extend security policies to the entire network
  • Agent Software for Roaming Users or Standalone Devices
  • Microsoft Windows agent that enforces policies on the device. Tamper proof and simple to deploy either with an install wizard or scripted via Active Directory Group Policy. Mac OS X version will be available soon.
  • Secure Browser for iOS
  • A secure browser app for iOS6 and above provides an alternative to Safari which extends the web access controls to the mobile device
  • Scalable
  • Highly optimised for large networks, the solution takes advantage of multiple processors, all available RAM and has a 64-bit architecture
  • Deployment Modes
  • Agent software, Direct proxy (set by group policy, WPAD or manually), or gateway mode for guest, BYOD or non-domain devices
  • WPAD Support
  • Automatic creation of Web Proxy Automatic Discovery (WPAD) file based on network configuration
  • BYOD Captive Portal
  • The Captive Portal allows existing users or guests to adopt BYOD and log in from those devices with valid user credentials e.g. Active Directory
Download as PDF

Services

Gateway Security

In todays connected world, Web & Email Services are critical business tools. Your company has to protect it’s users from multiple internet borne threat vectors at all times on all their devices, from smartphones to laptops and desktop computers.

Cognosec Services

Cognosec Services

Features

We provide a full service offering from consulting, gap analysis, architecture & design, implementation and management of:

  • Hybrid Cloud mail and web gateway services incorporating Cloud application control
  • Integration with Data Loss/Leakage Prevention (DLP) Services
  • Application Aware Content Filtering Capability
  • Advanced Zero Day Threat Detection Capability with Global Threat Intelligence Feeds
  • Enhanced management of Office365 and Gmail (Granular Security Features that appear in our Portal making these platforms safer to use)

Description

In todays connected world, Web & Email Services are critical business tools. Your company has to protect it’s users from multiple internet borne threat vectors at all times on all their devices, from smartphones to laptops and desktop computers. The widespread use of mobile and BYOD platforms has resulted in a vanishing perimeter. Modern web & email gateways have become increasingly complex to configure and manage. They handle huge volumes of digital traffic and need to constantly update their malware, adware, URL reputation services and anti-spam engines. The high adoption of cloud-based email services, like Office365 and Gmail, coupled with an upsurge in mail-borne cyber attacks incorporating ransomware has brought renewed focus to effective web and email security. We provide a thought leadership together with niche services in this domain for any size of business. Hybrid or Cloud-based solutions – seamlessly implemented & managed for you by our Gateway Security Team. This is a subscription service.

Download as PDF