Best Kaspersky Security for Internet Gateway Alternatives in 2024
Find the top alternatives to Kaspersky Security for Internet Gateway currently available. Compare ratings, reviews, pricing, and features of Kaspersky Security for Internet Gateway alternatives in 2024. Slashdot lists the best Kaspersky Security for Internet Gateway alternatives on the market that offer competing products that are similar to Kaspersky Security for Internet Gateway. Sort through Kaspersky Security for Internet Gateway alternatives below to make the best choice for your needs
-
1
SKUDONET provides IT leaders with a cost effective platform that focuses on simplicity and flexibility. It ensures high performance of IT services and security. Effortlessly enhance the security and continuity of your applications with an open-source ADC that enables you to reduce costs and achieve maximum flexibility in your IT infrastructure.
-
2
Cisco Umbrella
Cisco
1,110 RatingsAre you enforcing acceptable web use in accordance with your internal policies? Are you required by law to comply with internet safety regulations like CIPA? Umbrella allows you to effectively manage your user's internet connection through category-based content filtering, allow/block list enforcement, and SafeSearch browsing enforcement. -
3
Secubytes LLC
119 RatingsUTunnel Secure Access delivers Cloud VPN, ZTNA, and Mesh Networking solutions to ensure secure remote access and smooth network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service enables quick deployment of Cloud or On-Premise VPN servers. Utilizing OpenVPN and IPSec protocols, it facilitates secure remote connections with policy-based access control, allowing you to easily establish a VPN network for your business. ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) solution transforms secure access to internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can access these applications through web browsers without needing client software. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution provides granular access controls to specific business network resources and supports the creation of secure interconnected business networks. SITE-TO-SITE VPN: The Access Gateway solution also allows for the setup of secure IPSec Site-to-Site tunnels. These tunnels can connect UTunnel's VPN servers with other network gateways, firewalls, routers, and unified threat management (UTM) systems. -
4
VersaONE
Versa Networks
89 RatingsThe AI-powered platform enables unified security and network. AI-powered data and threat protection minimizes human error and increases the speed of detection. AI-powered networks improve user and app experiences, as well as performance and reliability. Reduce your TCO with a converged infrastructure that simplifies your infrastructure and reduces point products sprawl, fragmented operation, and complex management. VersaONE offers seamless connectivity and unified protection for all users, devices and locations, including offices, branches and edge locations. It provides secure access to all of your workloads, cloud applications, and wireless networks from a single platform. This ensures that data and resources can be accessed and secured across any network, whether it is WAN, WLAN, cellular, or satellite. This unified platform approach simplifies network management and reduces complexity while enhancing security. It meets the demands of modern IT environments. -
5
Forcepoint Secure Web Gateway
Forcepoint
Protect the web from malware and threats by proactive protection. Full content inspection and in-line scanning help to reduce risk. You can easily secure your global workforce using a single endpoint with Web Security, DLP and CASB. Flexible connectivity and traffic redirection options are also available. You can deploy where, when, and how you want. You can choose from hybrid, on-premises, or cloud deployment architectures to move at your own pace to the cloud. Inline capabilities and behavioral analytics help to protect your data and policies around the globe. Consistent policies that provide strong access control for all sites, cloud apps, users, and other users on and off the corporate network. Protect users from malicious threats, including zero day threats. Protect users from zero-day threats using remote browser isolation and real-time threat intelligence. Deep content inspection is available for encrypted and unencrypted traffic, which allows you to detect evolving threats throughout the kill chain. -
6
WebTitan
TitanHQ
11 RatingsWebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan Cloud for Wi-Fi is a cloud-based content filtering solution for your Wi-Fi environment. Wi-Fi guests can be exposed to unsuitable websites and malware. WebTitan Cloud for Wi-Fi allows you to control the content that can be accessed, creates a safe environment to access the internet, and provides your organization with reports regarding network usage. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. This makes the WebTitan Cloud DNS filter an ideal solution for organizations needing maximum protection and minimal maintenance. WebTitan Cloud is a low maintenance solution that can be set up in five minutes to stop your users from accessing inappropriate content online. Start your free Trial of WebTitan today, with full support included. -
7
Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
-
8
Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
-
9
Trustwave Secure Web Gateway
Trustwave
Provides real-time protection from malware and strong policy enforcement. You also have the option to have the technology managed by our experts and augmented with our intelligence, without ever losing control. Cybercriminals are constantly lurking behind the scenes, and your employees rely on email and the internet to do their jobs. Secure Web Gateway protects your employees' endpoints from malware-infected internet connections and enforces your company's policies. A cloud deployment can be extended across your company to remote offices and roaming users, offering continuity, scalability, and lower costs. An on-premises solution comes with behavior-based security engines and multi-layered antimalware to help you drive scale and performance. Our experts will design and update security and control policies that are tailored to your needs. -
10
Perimeter 81
Perimeter 81
$8 per user per month 1 RatingPerimeter 81, a SaaS-based solution that provides customized networking and the highest level of cloud security, is revolutionizing how organizations use network security. Perimeter 81 simplifies secure network, cloud, and application access for modern and distributed workforce with an integrated solution that gives companies of all sizes the ability to be securely mobile and cloud-confident. Perimeter 81's cloud-based, user-centric Secure Network as a service is not like hardware-based firewalls and VPN technology. It uses the Zero Trust and Software Defined Perimeter security models. It offers greater network visibility, seamless integration with all major cloud providers, and seamless onboarding. -
11
ContentKeeper
ContentKeeper Technologies
1 RatingOrganizations today need a security solution that can scale for future expansion, integrate seamlessly with existing technology and centralizes policy management. It also provides control over remote locations and mobile users. ContentKeeper's Secure Internet Gateway, (SIG), helps protect against malware and ensures policy management across all devices. Our Multi-layered Web Security Platform provides full visibility into web traffic, activity, and network performance without adding complexity. Multiple layers of defense are used, including machine learning/predictive files analysis, behavioral analysis, cloud Sandboxing, and threat isolation to protect against malware and advanced persistent threats. This product is designed for high-demand networking environments. It simplifies security and policy management, and ensures safe and productive web browsing regardless of device or geographic location. -
12
FortiProxy
Fortinet
Organizations need a holistic approach to protect themselves from malicious websites, viruses, and web traffic as attacks become more sophisticated. FortiProxy, Fortinet's secure gateway for the web, addresses these issues with a single product that protects against web attacks. It includes URL filtering, advanced threat defense and malware protection. Protect end-users against internet-borne threats and enforce policy compliance. Secure Web Gateway addresses multiple security issues within one product. One solution that protects against web attacks by URL filtering, advanced threats defense and malware protection. This helps users to avoid internet-borne threats and enforces internet policy compliance. FortiProxy, a secure web proxy, protects employees from internet-borne threats by using multiple detection techniques, such as web filtering and DNS filtering, data loss prevention and advanced threat protection. -
13
Clearswift's Secure Web Gateway allows organizations to ensure consistent internet security by implementing flexible and granular policy management across web traffic and web-based applications. Real-time content and context aware scanning can detect and modify sensitive information shared on the internet, such as documents uploaded to websites or social media. SWG allows you to monitor web traffic, detect malicious sites and remove harmful executables and scripts from downloaded content. SWG allows you to balance the need for security and the desire to collaborate with suppliers, customers, and partners all over the internet.
-
14
Barracuda Web Security Gateway
Barracuda Networks
Barracuda Web Security Gateway allows organizations to use online tools and applications without being exposed to web-borne malware, viruses, lost productivity, or misused bandwidth. It is a comprehensive solution to web security and management. It combines award-winning spyware, virus, and malware protection with a powerful policy engine and reporting engine. Advanced features allow organizations to adapt to new requirements such as remote filtering, social-network regulation, and visibility into SSL encrypted traffic. Remote user licenses can be purchased for unlimited access to the corporate network. This allows you to control content and access policies on mobile devices. Virtual appliances are also available for the Barracuda Web Security Gateway. Barracuda Content Shield is a hosted web security solution. -
15
FortiGate SWG
Fortinet
Secure Web Gateway (SWG), enterprise-class protection against web-borne threats Secure Web Gateway (SWG), solutions use web filtering in order to enforce company Internet access policies. They can also filter unwanted software, including malware, from user-initiated Internet connection. SWGs are vital as enterprises continue to improve their WAN Edge. Applications are moving to the cloud rapidly, and the attack surface at branch locations and remote sites is increasing. Security risks are particularly high for web-based traffic. As attack techniques improve, organizations require an integrated approach to protect against both internal and external risks. URL filtering, application control and deep HTTPS/SSL inspection are all part of an SWG solution. Data loss prevention and remote browser isolation capabilities are also included. Flexible deployment options are available with Fortinet's SWG, including explicit, transparent and inline modes. -
16
Azure NAT Gateway
Microsoft
$0.045 per hourNAT Gateway is a managed service that secures the routing of internet traffic from a virtual private network. It offers enterprise-grade performance with low latency. NAT Gateway provides outbound connectivity with software-defined networking and high availability. Deploying a NAT gateway resource will allow you to connect outbound securely with enterprise-grade performance. You can assign your NAT Gateway to subnets in a single virtual network with static IP addresses. NAT Gateway will automatically use the default route for the internet when configured to a specific subnet. No traffic routing configurations are required. -
17
ProxySG and Advanced Secure Gateway
Broadcom
Symantec offers high-performance, on-premises secure web gateway appliances to protect organizations across the web and mobile networks. For a centrally managed, secure hybrid web solution, combine it with the cloud-delivered Web Security Service. Symantec provides organizations protection with a high-performance, scalable web proxy appliance that protects against advanced threats to web activity. Symantec Secure Web Gateway solutions use a unique proxy server architecture to allow organizations to monitor, control and secure traffic to ensure safe web and cloud experiences. Symantec's cloud security and secure web proxy solutions give you complete visibility into SSL/TLS encrypted web traffic. Symantec Web isolation prevents websites from delivering zero day malware. It protects users' devices by running web sessions away endpoints and safely transmits rendering information to the browser. -
18
Check Point URL Filtering
Check Point Software Technologies
Attacks on enterprises are most common via web access. Check Point URL Filtering manages access to millions web sites by category, users and groups. This helps to protect users from malicious sites, and allows for safe Internet use. URL Filtering uses UserCheck technology to educate users about web usage policy in real-time. Protects users using cloud-based categorization technology and UserCheck technology. Allows you to use any Check Point security gateway, reducing your total cost of ownership. Unified security across all web areas with full application control integration. Security teams must be capable of controlling, securing, and monitoring every device on the network at any time. Check Point solutions allow you to block infected devices accessing corporate data or assets. This includes employees' mobile devices, workstations, IoT devices, and industrial control systems. -
19
AppXML
Radware
AppXML is a web service gateway that enhances service-oriented architecture (SOA). It speeds up document processing and protects XML-based communications. It acts as a trusted intermediary to exchange secure Web services between your business partners and your enterprise. It provides administration and reporting capabilities that allow you to manage web service gateway deployments. This includes policy management, status monitoring and alerts. Logs can also be logged and reports can be generated. It adds a layer of infrastructure to the network layers and applications. This allows you to simplify, secure, and accelerate XML and web gateway security deployments. It speeds up XML document processing and protects XML-based communications. Protect your business from malicious and unintended attacks, without having to modify web services or alter and rewrite applications. -
20
Forcepoint URL Filtering
Forcepoint
Forcepoint URL Filtering provides defenses against productivity It prevents the loss of web content and other threats to operations. It provides security. Delivering defenses against terrorism can increase organizational productivity Web activity that drains productivity while providing the required Security in a world with advanced threats This is a simple solution. Manage, enables compliance around controlling certain categories Materials accessed via the Internet are not intrusive. -
21
Barracuda Content Shield
Barracuda
Protect your business's web browsing. At any given moment, 18.5 million websites are infected by malware. Protect your business and users from malicious downloads, websites, and links. Protect your users, both local and remote, from malicious files and websites. 40% of internet activity is not work-related. With granular access policies, you can stop unproductive and inappropriate web browsing. You can get started in minutes and there is no need to install client software. Barracuda Content Shield Plus, a cloud-based service, offers robust content filtering, file protection, granular policy enforcement, reporting, and real-time threat information to protect your users, organization, and brand. Its proxy-free architecture guarantees minimal latency. Barracuda Content Shield offers advanced web security, but with a smaller feature-set. Content Shield offers advanced DNS filtering and URL filtering. It uses agent-based filtering. -
22
Trend Micro Web Security
Trend Micro
Trend Micro™, Web Security protects you against cyber threats before they reach users. It uses crossgenerational defense methods to detect known and unknown threats. This gives you visibility and control over unapproved cloud applications for each user. Our unique deployment model allows you to deploy gateways either on-premises or in the cloud. This protects your users regardless of where they are located. One cloud-based management console makes it easy to manage policy, users, and report from one place. Trend Micro Web Security prevents threats from reaching your endpoints directly in the cloud. Your users will be protected on any device, including mobile platforms and desktops, from any location. -
23
Zecurion SWG
Zecurion
Protect your network and prevent mixed threats using Zecurion Secure web Gateway. Both do not slow down existing processes or affect network performance. Both slow down existing processes and affect the network performance. Enterprise-level performance and rich functionality. Operates in networks that have up to 200K workstations. Protects against attacks using the integrated IDS/IPS module. Supports HTTPS, FTP Over HTTP and other protocols. Native integration with DLP. Integration with any other software via ICAP. The most up-to-date and accurate content filtering database. Sites are classified manually by an individual, not by a robot. Daily database updates. More than 100 resource categories. Rapid categorization of unknown and new web sites. Policies with per-user granularity. The database contains over 5 million URLs. One solution to monitor the entire corporate threat landscape. Use zecurion SWG in conjunction with zecurion DLP! -
24
Passages
Ntrepid
Passages allows your users to access any website and follow any link, without risk to your data or infrastructure. You can also monitor and manage it all easily. Passages' technologies and components are mature and proven. They were developed from the robust Internet platforms Ntrepid has created over the past 15 years for national security. They put our solutions against some of the most aggressive and sophisticated adversaries in the world. Because firewalls and conventional malware protection are inadequate, corporate security breaches happen on the internet. Malware isolation is the solution. Protect your data and infrastructure by containing and eliminating web-delivered malware using Passages. High-targeted attacks are the latest favorite technique of sophisticated hackers. However, they cannot target individuals or corporations they don't know. To avoid these dangerous attacks, hide your IP address and identifying data. -
25
Symantec WebFilter is powered by the Global Intelligence Network. It provides real-time web content protection and security categorization. The web filtering service categorizes billions upon billions of URLs automatically into over 80 predefined categories. These include 12 security categories that IT administrators can easily manage. Symantec Secure Web Gateway includes Blue Coat ProxySG and provides the most precise and comprehensive web application control policy engine to protect your entire enterprise's web filter and cloud access protection. Advanced Intelligence Services adds new options to your webfilters and content control policies. They also offer additional security management options with URL threat levels and geolocation.
-
26
Skyhigh Security Secure Web Gateway (SWG)
Skyhigh Security
Skyhigh Security SSE integrates with Skyhigh Security Secure Web Gateway (SWG) to help you understand and manage your web access. This mature web security solution is designed to protect users from zero day threats and enforce data privacy everywhere. Skyhigh Security Secure Web Gateway is an intelligent, cloud-native web security system that protects your workforce against malicious websites and cloud applications. It can be used from any device, any app, and any location. Hyperscale Service Edge provides seamless connectivity and no disruption to users. It features cloud-native web security and blazing fast ultra low latency. Cloud Security Advisor provides real-time insights and cloud isolation to protect users, data, applications, and minimize web and cloud attack surface. Our robust DLP engine and integrated CASB functionality allows you to control access to all cloud services. It also protects against data loss. -
27
Even legitimate websites can be infected by advanced threats. Users could click on unsafe sites and put your company at risk. Cisco Secure Web Appliance protects you organization by blocking dangerous sites and testing unknown sites before users can click on them. Cisco Secure Web Appliance protects your users with TLS 1.3 and high performance capabilities. Cisco Secure Web Appliance offers multiple ways to automatically detect web-based threats and block them. The Cisco Secure Web Appliance Premier license, powered by Talos threat research, includes in-depth URL filtering, reputation analysis, multiple antivirus engines and Layer 4 traffic monitoring. It also includes Malware Defense for Secure Web Appliance (CTA) and Cognitive Threat Analytics (CTA).
-
28
Citrix Enterprise Browser
Cloud Software Group
$2 per user per monthKeep your data secure from browser-based attacks. Internet is one of your biggest enemies when it comes to security. This is a problem because employees need to be able to access the internet in order to be productive. Citrix Enterprise Browser can help. This cloud-hosted web browser allows you to protect your network thoroughly without complicating the user experience. Go ahead--let employees browse away. We'll isolate this traffic and keep your network safe. Your devices and data are protected even if someone visits a compromised website. Teams have more freedom. You get greater control. Employees want unlimited browsing. IT must keep web-based threats at bay. Citrix Enterprise Browser allows you to do both. Citrix Enterprise Browser is completely independent of your network. Each session is destroyed once used, so browsing is completely isolated. Even as you give employees more options to work on the go, your corporate resources are still safe. -
29
Sangfor IAG
Sangfor
Secure Web Gateway has been included in the SWG Gartner Magic Quadrant 10 years consecutively. Sangfor IAG (formerly Sangfor IAM) is an excellent Internet behavior management solution that includes professional internet bandwidth management, URL filters, traffic control and information control. It also offers behavior analysis, wireless network management, behavior analysis, and more. This solution can help you achieve effective Web filtering and unified internet behaviour management for all clients across the network. Access to non-business-related websites and distractions is minimized. Maximize bandwidth usage and availability. Protects intranet data security and minimizes regulatory risks. Visual management and complete control of wireless access points. Allows for unified internet behavior management of wired and wireless networks. -
30
Kitecyber
Kitecyber
Kitecyber is a hyper-converged solution for endpoint security that provides comprehensive security, and meets the compliance requirements of organizations such as SOC2, ISO27001 HIPAA PCI-DSS GDPR, PCI-DSS etc. Our endpoint-based solution eliminates the need to install cloud gateways and local appliances. Hyper-converged offerings include the following protections. Secure Web Gateway: Protect internet access with this gateway. 2) Eliminate Shadow SaaS (and Shadow AI) 3) Anti-Phishing Measures to Protect User Credentials 4) Zero Trust Private Access 5) Data loss prevention across all devices - Mac, Windows and mobile 6) Device management for Mac, Windows and mobile devices for all employees, BYOD and third party contractors 7) Continuous Compliance Monitoring 8) User Behavior Analyses to identify potential risks -
31
CensorNet Web Security
Censornet
Censornet Web Security protects your organization from web-borne malware and offensive or inappropriate content. It also helps you manage time spent on websites that can impact productivity. Unique architecture ensures lightning-fast response times for all users, no matter where they may be in the world. -
32
Verizon Secure Gateway
Verizon
Combine the security and large capacity of private networks with the convenience and speed of the public internet. Secure, reliable access to remote locations via encrypted connections Secure Gateway extends your WAN environments and users to remote locations via a cloud-based port. Secure Gateway provides centralized security that allows customers and employees to connect securely and collaborate anywhere and anytime. Secure Gateway services allow Private IP customers to secure remote access to their corporate network applications and remote access to the public Internet. Remote workers can access your network from smaller sites that don't require premium internet connections or remote locations that are difficult to reach. This will allow you to increase productivity and extend your network. Employees have secure access to important information and apps from anywhere. -
33
ContentProtect
Content Watch
$39.99ContentProtect blocks inappropriate and time-wasting web content to increase productivity. The powerful cloud-based administration tools allow you to make changes and view reports from anywhere. -
34
Avast Secure Web Gateway
Avast
You can block web threats before they reach your network. This will protect your network traffic without the need for additional proxy servers or appliances. Filter web traffic to keep malware from reaching networks. Secure Web Gateway is easy to set up and manage from multiple locations. For lightning-fast connections anywhere in the world, devices are automatically directed to the nearest Data Center. Our threat network is geographically dispersed and includes over 100 data centers on five continents. It also draws from dozens top threat feeds that act like security guards and monitor, process, and report on approximately 30 billion requests per day. Secure Web Gateway allows uncategorized web addresses to be accessed. The site is then scanned for threats and classified into one of the dozens of categories. This results in continuous updates to the entire security network. -
35
Our mission is to empower productivity in a privacy-focused environment where work and play can occur anywhere. It's vital that cybersecurity is with you everywhere you go. This includes protecting your data from the point of origin to the cloud. As most people now work and manage their lives online, mobility and cloud technology are essential. Lookout solutions are customizable for any industry or company size. They integrate endpoint and cloud security technologies. This platform can be used by individuals, large corporations, and government agencies. Cloud access does not have to be limited to certain services. Security should not interrupt productivity or interfere with the user's experience. We provide visibility and insight into all data, enabling you to secure your data.
-
36
Symantec Web Security Service
Broadcom
Cloud-delivered network security services enforce comprehensive internet security policies and data compliance policies regardless of where you are located or what device you use. Your network is at greater risk due to increased web usage, cloud adoption, and more remote and mobile users. Symantec Web Security Service is an essential line of defense against cyber threats. It secures web services and allows enterprises to control access. It also protects users against threats and protects their sensitive data. Although it introduces new security risks and compliance, the cloud also offers tremendous new defensive strategies. Cloud-delivered network security increases flexibility and performance, while protecting users with consistent threat prevention policies and data compliance policies, no matter where they are. -
37
iboss
iboss
The iboss Zero Trust Secure Access Service Edge (SASE) redefines network security architecture for modern businesses, enabling secure, direct-to-cloud connections that prioritize safety and speed. At its core, iboss Zero Trust SASE enforces strict access controls, ensuring that only authenticated and authorized users and devices can access network resources, regardless of their location. This is achieved through a comprehensive suite of security services that operate under the principle of "never trust, always verify," including advanced threat protection & malware defense, data loss prevention (DLP), CASB, RBI, ZTNA, and real-time inspection of encrypted traffic. Built in the cloud, iboss Zero Trust SASE provides unparalleled visibility across all user activities and sensitive data transactions, facilitating a secure digital transformation. This allows organizations to adopt a more flexible, perimeter-less security model that supports the dynamic work environments of today's workforce. With iboss Zero Trust SASE, businesses can confidently embrace cloud technologies and mobile working without compromising on security, ensuring a balance between productivity and protection in the ever-evolving cyber landscape. -
38
Your new SWG. Your new SWG. Fly-Direct's architecture allows all functionality to be performed on the device without compromising performance. When users migrate from an old SWG, they will notice that speed, reliability and security have all improved. Dope.swg includes integrated URL filtering and Anti-Malware, Cloud Application Controls (Cloud IT), Shadow IT, user/group based policies, as well as Cloud Application Controls. You decide where users can go. In the rare event that dope.cloud goes down, fail-safe functions allow access to trusted websites defined by the company while blocking new requests. Dope.swg’s endpoint-driven Proxy solves reliability, performance and privacy issues customers face with legacy SWGs. Install the proxy on your device instantly with just a few clicks.
-
39
A web filtering platform that is fully integrated for managed service providers. Archon filters traffic via a proxy system. This allows you to allow access to certain parts of a site and block others. Archon is centrally managed and deployed in a single click. This eliminates the need for expensive hardware. Archon can learn from every new deployment and scan site to optimize itself. Traditional UTM systems protect devices only within their networks. Archon protection is portable with the device. Protect your clients wherever they are doing business. Gartner estimates that half of employees will continue working remotely even after COVID-19 is over. Traditional security platforms, such as corporate firewalls or VPNs, don't consider new work trends like hybrid work from home. Employees can access cloud storage and e-mail from multiple devices, even their personal computers. Archon was designed with geographic diversity in view.
-
40
Smoothwall Filter
Smoothwall
Facilitates a safer digital learning environment by providing real-time content-awareness and granular control through web filtering. Protects users by categorizing new or existing content in real time by analysing the content, context, and construction of each page. Web filtering policies can be created based on user group and content category, IP location, time, and time. Securely grant guest mobile devices internet access on your network across all platforms. Allow read-only access to social media sites and remove inappropriate content. Educational organizations face the challenge of protecting students from harmful content and allowing them to learn freely. It is crucial to avoid blocking or placing unreasonable restrictions. Analyzes the content, context, and construction of each page to categorize new and existing web content in real-time. -
41
Internet Lock
TopLang Software
$29.95/one-time/ user Internet Lock provides access control and password protection for your internet connections. Internet Lock allows you to fully control your internet connections and programs. Internet Lock allows you to restrict or password protect internet access. You can also schedule internet access. It protects internet programs on specific IP addresses or domains. You can limit access to the websites you specify or prevent them from accessing unwelcome websites. Internet Lock can be used to block internet connections and programs. Internet Lock will block programs from accessing the internet. Internet Lock can be used to password protect internet connections and programs. To access protected programs, users must enter the correct password. Internet Lock displays a window asking users to enter their password when a password-protected program attempts to connect to the internet. If the user cannot provide the correct password, Internet Lock will pop up. -
42
Zenarmor
Zenarmor
Instant security wherever you have a network connection! Manage all your Zenarmor instances easily through the cloud-based interface and take control of your security! A powerful enterprise-class filtering engine that blocks and detects advanced malware, as well as highly sophisticated threats. Zenarmor can be installed on an old PC or virtual system at home. Free, lightweight, and nimble. This allows enterprises to launch software-based Micro Firewalls on demand, to easily secure assets anywhere and at any time. AI-powered cloud-based web categorization databases provide real-time classification of hundreds of millions sites. Unknown sites will be categorized within 5 minutes. -
43
IBM® Sterling B2B Integrationator allows companies to integrate complex B2B or EDI processes across multiple partner communities through a single gateway. It offers a flexible platform that can be used on-premises or in hybrid cloud. It supports data transformation and most communication protocols, secures your B2B network, data, and provides certified container support. Additionally, it has high availability with IBM Sterling Global Mailbox. B2B Integrator allows you to reduce costs and automate B2B processes across multiple enterprises. It also provides governance, compliance to standards, and visibility. High-availability gateway platform designed for the most challenging environments. It offers global mailbox options for geographical distribution and real-time replication of data. Installing your solution in a certified container with all necessary components will significantly reduce the time it takes to patch and install it.
-
44
MONITORAPP AISWG
MONITORAPP
Secure Web Gateway (SWG) AISWG. We can't see what sites pose threats to corporate assets or the security of working environments for internal users. AISWG is a secure gateway that blocks harmful websites and prevents information from being leak. AISWG is a critical solution to protect corporate assets against various threats. We are increasingly exposed to web sites that can threaten our business productivity and assets as we use the Internet more often. Accessing non-business websites wastes time and can lead to the loss of valuable corporate assets. Additionally, inappropriate web uploads information easily and leaks company assets. Secure Web Gateway (SWG), is a security solution that effectively controls the use of the internet to protect company assets and reduce corporate productivity. AISWG improves business efficiency by monitoring client web access. -
45
Browser Security software protects sensitive enterprise data from cyberattacks. Browser Security Plus is an enterprise browser security software that IT administrators can use to manage and secure their browsers across networks. It allows them to monitor browser usage trends, manage browser extensions and plug-ins and lock down enterprise browsers. Administrators can use this tool to protect their networks against cyberattacks such as ransomware, trojans, watering holes attacks, phishing attacks, viruses, ransomware, ransomware, and trojans. Get complete visibility into the browser usage trends and addons across your network. Identify which add-ons are susceptible to security breaches. Add-on Management allows you to manage and secure browser add-ons.
-
46
BlackBerry Cyber Suite
BlackBerry
Protect your users and devices, including BYOD laptops, smartphones, and tablets, with a solution that focuses on building trust across all endpoints and validating that trust at each transaction. Are you able to empower your employees no matter where they are working? It's important that employees have secure access to data and apps even if they are unable to report to work. The BlackBerry®, Cyber Suite provides total security, effectively protecting against breaches and protecting against sophisticated threats with advanced AI. It offers a complete Zero Trust solution that covers all devices, ownership models and networks. It authenticates users continuously and dynamically adjusts security policies to provide a Zero Touch experience that improves security without user interruption. -
47
Forcepoint WebShield
Forcepoint WebShield
Secures HTTP traffic in the enterprise. Also provides access to web-based resources on more sensitive networks. Forcepoint WebShield, a Commercial-Off-The-Shelf (COTS) data guard, provides secure Web search and browse-down capabilities from high-side networks to lower-level networks. WebShield is a secure platform for complete information browsing and discovery. It supports the most cross-domain transfer users. WebShield offers transparent protection across the entire network, allowing users to complete their missions with greater protection. Security policies allow users to restrict their access to certain file types and servers when they are surfing lower-level networks. All requests, responses, and transfers are subject to security controls such as virus scan, dirty word search, and malicious content checks. Forcepoint WebShield has been approved as a cross domain transfer solution by the Unified Cross Domain Services Management Office Cross Domain Baseline. -
48
iPrism Web Security
EdgeWave
iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service. -
49
Secucloud
Secucloud
Secucloud GmbH is active worldwide as a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform particularly for providers. The Elastic Cloud Security System 2 (ECS2) is available to a wide range market and target groups, including mobile communications & landline users, small businesses & homes, SMEs, and allows them to access enterprise-level security solutions. This platform is easy to use and doesn't require any hardware or proprietary appliances. It can support more than 100 million connected users. Secucloud is at forefront of cyber security and has built strong partnerships over the years with industry leaders, combining their expertise to its own internal innovation cycles. Secucloud is well-positioned to fight an ever-changing landscape of cyber threats. -
50
BlackBerry Access
BlackBerry
Access your corporate network from personal devices or not-corporate managed devices. Enterprise data is protected with full containerization to reduce data leakage. BlackBerry® Access offers a secure and intuitive user experience for intranet browsing. Employees have access to corporate intranets on their personal devices or those of the company. BlackBerry desktop offerings allow you to simplify your bring your computer program. They offer modern alternatives to traditional VPNs and VDI solutions. BlackBerry® Desktop allows users to securely access corporate content and resources from their own Windows 10 or macOS devices. It also includes BlackBerry Access and BlackBerry® work. BlackBerry Access is a secure browser that allows you to enable mobile access for your company network. It supports iOS, Android and Windows.