Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
                    Are you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement.
                
            
        
            Description
                    Intra allows you to bypass websites and applications that have been restricted due to Domain Name System (DNS) manipulation, a prevalent method of online censorship. Additionally, Intra offers protection against phishing attempts and malware attacks, which are designed to capture sensitive information such as usernames and passwords or to install malicious software on your devices by redirecting you to fraudulent sites. Using Intra is incredibly straightforward — simply activate it and you can forget about it. Furthermore, Intra does not impede your internet speed and there are no data caps involved. Your privacy is safeguarded with Intra, as it does not monitor the applications you utilize or the websites you browse. You also have the option to customize your DNS server provider, enhancing your control over your internet experience. Intra encrypts your connection to a public DNS server for added security. Essentially, DNS servers function like a contact list for the internet, supplying the precise addresses you need to access websites or open applications. With Intra, you can feel secure and confident while navigating the online world.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    AT&T Alien Labs Open Threat Exchange
            
            
        
        
    
        
        
            
                
    AuthPoint
            
            
        
        
    
        
        
            
                
    BlueCat Gateway
            
            
        
        
    
        
        
            
                
    Blumira
            
            
        
        
    
        
        
            
                
    Chronicle SOAR
            
            
        
        
    
        
        
            
                
    Cisco Secure Web Appliance
            
            
        
        
    
        
        
            
                
    Cisco SecureX
            
            
        
        
    
        
        
            
                
    CloudNuro
            
            
        
        
    
        
        
            
                
    Encapto
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    AT&T Alien Labs Open Threat Exchange
            
            
        
        
    
        
        
            
                
    AuthPoint
            
            
        
        
    
        
        
            
                
    BlueCat Gateway
            
            
        
        
    
        
        
            
                
    Blumira
            
            
        
        
    
        
        
            
                
    Chronicle SOAR
            
            
        
        
    
        
        
            
                
    Cisco Secure Web Appliance
            
            
        
        
    
        
        
            
                
    Cisco SecureX
            
            
        
        
    
        
        
            
                
    CloudNuro
            
            
        
        
    
        
        
            
                
    Encapto
            
            
        
        
    
        
        
            
                
    JupiterOne
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        Free
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Cisco
Founded
1984
Country
United States
Website
umbrella.cisco.com/solutions/web-content-filtering
Vendor Details
Company Name
Intra
Website
getintra.org
Product Features
Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Managed DNS
                                        Anti-Malware
                                        
                                    
                                    
                                    
                                        Change Management
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        DNS Failover
                                        
                                    
                                    
                                    
                                        DNS Propagation
                                        
                                    
                                    
                                    
                                        Disaster Recovery
                                        
                                    
                                    
                                    
                                        Global DNS Network
                                        
                                    
                                    
                                    
                                        Intelligent Traffic Routing
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secondary DNS
                                        
                                    
                                    
                                    
                                        Web Application Firewall (WAF)
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Web Content Filtering
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Automated Blacklist
                                        
                                    
                                    
                                    
                                        Browser-based Management Portal
                                        
                                    
                                    
                                    
                                        Category / Keyword Filters
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Multi-Language Filtering
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Roles / Permissions
                                        
                                    
                                    
                                    
                                        SSL Inspection
                                        
                                    
                                    
                                    
                                        Time-based Controls
                                        
                                    
                                    
                                    
                                        VPN Blocking
                                        
                                    
                                    
                                    
                                        White Label
                                        
                                    
                                    
                                    
                                        Whitelisting
                                        
                                    
                            
                         
         
         
        