SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Secure Web Gateway Data Sheet




DeepNines Secure Web Gateway
protect, control and manage web applications, users and traffic

Challenges of the Web
Web threats and risks become more sophisticated every day, making managing Web traffic more complex than ever.
Complicating the matter is the fact that Web users have noticeably evolved from a basic understanding and use of the
Web to a highly developed relationship where they rapidly consume Web applications and bandwidth. This presents
networking and security professionals with a real dilemma – balancing security, usability and costs. Solving these
challenges is the DeepNines Secure Web Gateway product that protects, controls and manages all Web traffic in a
single, affordable appliance.


The Web Security Solution
DeepNines Secure Web Gateway enables organizations to easily protect, control and manage Web applications and
traffic with complete in-line visibility across all ports, protocols and user identities. By unifying patented firewall,
intrusion prevention, threat prevention and identity-based Web content and application security in a single product,
Secure Web Gateway solves the challenges of the Web by providing both best-in-class security and performance.
The Secure Web Gateway appliance uniquely prvides identity-based application control, proxy blocking, threat prevention,
intrusion prevention, bandwidth management, content filtering and data loss prevention across all ports and protocols that
performs at gigabit speeds. With all-inclusive and high-performance Web security,
Secure Web Gateway customers enjoy the lowest total cost of ownership (TCO) in
the industry by reducing hardware sprawl, point security products, and
bandwidth overhead. The Secure Web Gateway appliance provides
powerful and advanced administrative, monitoring and reporting tools
in an easy-to-use user interface that includes complete visibility of
the entire network.




                                                                                              R e a l -T i m e N e t w o r k D e f e n s e
Secure Web Gateway Data Sheet




The Web Security Solution
   Feature                                                     Benefit

   Identity-based management                                   Complete visibility and control of all Web users and Web usage

   Virus and malware protection                                Protection from today’s Web-based threats of viruses, phishing attacks, and all
                                                               forms of malicious code

   Content filtering                                            Granular policy enforcement for all websites and users with over 60 URL
                                                               categories that enables organizations to allow or block access to websites for
                                                               individuals, user groups, or globally

   Integrated intrusion prevention                             Real-time identification and protection from complex attacks by uniting behavioral
                                                               and signature-based intrusion prevention (IPS) with deep packet inspection (DPI)
                                                               across all ports and protocols

   Web application control                                     Identifies and classifies all Web applications for granular control of Web-based tools
                                                               and applications by user and policy to allow, block, limit or prioritize access to any
                                                               Web application by user and/or group

   Network bandwidth management Monitors and manages network traffic across all ports and protocols
                                enabling you to make informed decisions on access and control through traffic
                                shaping, regulating applications, and consumption prioritization

   Proxy blocking                                              Detects and prevents Web proxies and anonymizers that circumvent filtering
                                                               and security solutions and make Web activity untraceable and vulnerable to
                                                               attacks in real-time

   Data loss prevention                                        Power to identify and protect against data leakage regardless of application,
                                                               port or protocol in real-time with near-zero latency ensuring sensitive information,
                                                               confidential assets, and inappropriate content remains private to eliminate violations
                                                               with compliancy regulations, security practices and privacy policies

   Centralized reporting                                       Comprehensive, easy-to-use console for the DeepNines Secure Web Gateway
   and administration                                          product that enables administrators to report and manage the system

   Seamless integration                                        Effortlessly incorporate directory services including eDirectory, Active Directory
   with other solutions                                        and Open Directory for the identification and management of users within the
                                                               DeepNines Secure Web Gateway




                                                                                                                                                                                                                   DeepNines_WebSecGate_0909




1 4 6 4 3 D a l l a s P a r k w a y, S u i t e 1 5 0 | D a l l a s , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 . 2 7 3 . 6 9 9 6 | e m a i l s a l e s @ d e e p n i n e s . c o m | w e b d e e p n i n e s . c o m

Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines
features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their
respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise.
Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US
Patents 6,930,978, 7,058,976 and 7,380,272.

Weitere ähnliche Inhalte

Was ist angesagt?

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
Elliott Lowe
 
Application Security
Application SecurityApplication Security
Application Security
onenolesguy
 

Was ist angesagt? (20)

Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEM
 
Security & IP Protection
Security & IP ProtectionSecurity & IP Protection
Security & IP Protection
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Network security
Network securityNetwork security
Network security
 
Application Security
Application SecurityApplication Security
Application Security
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
Don't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_complianceDon't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_compliance
 
Azlan Security Offering
Azlan Security OfferingAzlan Security Offering
Azlan Security Offering
 

Andere mochten auch

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 

Andere mochten auch (7)

OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
2. secure web gateway
2. secure web gateway2. secure web gateway
2. secure web gateway
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Ähnlich wie Secure Web Gateway Ds Lr[1]

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
Natalie Hewitt
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
Wsg datasheet
Wsg datasheetWsg datasheet
Wsg datasheet
amingslip
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
Brian Kesecker
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
vfmindia
 

Ähnlich wie Secure Web Gateway Ds Lr[1] (20)

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
Cloudflare Access
Cloudflare AccessCloudflare Access
Cloudflare Access
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Wsg datasheet
Wsg datasheetWsg datasheet
Wsg datasheet
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Secure Web Gateway Ds Lr[1]

  • 1. Secure Web Gateway Data Sheet DeepNines Secure Web Gateway protect, control and manage web applications, users and traffic Challenges of the Web Web threats and risks become more sophisticated every day, making managing Web traffic more complex than ever. Complicating the matter is the fact that Web users have noticeably evolved from a basic understanding and use of the Web to a highly developed relationship where they rapidly consume Web applications and bandwidth. This presents networking and security professionals with a real dilemma – balancing security, usability and costs. Solving these challenges is the DeepNines Secure Web Gateway product that protects, controls and manages all Web traffic in a single, affordable appliance. The Web Security Solution DeepNines Secure Web Gateway enables organizations to easily protect, control and manage Web applications and traffic with complete in-line visibility across all ports, protocols and user identities. By unifying patented firewall, intrusion prevention, threat prevention and identity-based Web content and application security in a single product, Secure Web Gateway solves the challenges of the Web by providing both best-in-class security and performance. The Secure Web Gateway appliance uniquely prvides identity-based application control, proxy blocking, threat prevention, intrusion prevention, bandwidth management, content filtering and data loss prevention across all ports and protocols that performs at gigabit speeds. With all-inclusive and high-performance Web security, Secure Web Gateway customers enjoy the lowest total cost of ownership (TCO) in the industry by reducing hardware sprawl, point security products, and bandwidth overhead. The Secure Web Gateway appliance provides powerful and advanced administrative, monitoring and reporting tools in an easy-to-use user interface that includes complete visibility of the entire network. R e a l -T i m e N e t w o r k D e f e n s e
  • 2. Secure Web Gateway Data Sheet The Web Security Solution Feature Benefit Identity-based management Complete visibility and control of all Web users and Web usage Virus and malware protection Protection from today’s Web-based threats of viruses, phishing attacks, and all forms of malicious code Content filtering Granular policy enforcement for all websites and users with over 60 URL categories that enables organizations to allow or block access to websites for individuals, user groups, or globally Integrated intrusion prevention Real-time identification and protection from complex attacks by uniting behavioral and signature-based intrusion prevention (IPS) with deep packet inspection (DPI) across all ports and protocols Web application control Identifies and classifies all Web applications for granular control of Web-based tools and applications by user and policy to allow, block, limit or prioritize access to any Web application by user and/or group Network bandwidth management Monitors and manages network traffic across all ports and protocols enabling you to make informed decisions on access and control through traffic shaping, regulating applications, and consumption prioritization Proxy blocking Detects and prevents Web proxies and anonymizers that circumvent filtering and security solutions and make Web activity untraceable and vulnerable to attacks in real-time Data loss prevention Power to identify and protect against data leakage regardless of application, port or protocol in real-time with near-zero latency ensuring sensitive information, confidential assets, and inappropriate content remains private to eliminate violations with compliancy regulations, security practices and privacy policies Centralized reporting Comprehensive, easy-to-use console for the DeepNines Secure Web Gateway and administration product that enables administrators to report and manage the system Seamless integration Effortlessly incorporate directory services including eDirectory, Active Directory with other solutions and Open Directory for the identification and management of users within the DeepNines Secure Web Gateway DeepNines_WebSecGate_0909 1 4 6 4 3 D a l l a s P a r k w a y, S u i t e 1 5 0 | D a l l a s , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 . 2 7 3 . 6 9 9 6 | e m a i l s a l e s @ d e e p n i n e s . c o m | w e b d e e p n i n e s . c o m Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US Patents 6,930,978, 7,058,976 and 7,380,272.