en tr

Web Filtering

Cyberoam’s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 89+ categories. Available with the Cyberoam network security appliances (Next-Generation Firewalls/UTMs) and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses. Cyberoam’s Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Features Feature Description Benefits
. Web Categorization . On-cloud web categorization database
. Web filter with 89+ Web categories
. Custom categories
. Automatic updates through WebCat – The Website Categorization Engine
. Lowers response time and reduces privacy concerns
. Comprehensive and company-specific web filtering
.Web Filtering Options . URL
. Keyword
. File type
. Database
.Comprehensive web filtering & content filtering
.Web Security .Blocks third-party proxy and tunnelling software
.Blocks Google cache pages
.Blocks embedded URLs in websites
.Enforces ‘safe search’ in search engines
.Blocks malware, phishing, pharming URLs
.Blocks Java Applets, Cookies, Active X
.Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
.Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
.HTTPS Controls .Visibility into encrypted HTTPS Traffic
.Prevents unauthorized file upload and download over HTTP and HTTPS
.Blocks unauthorized, malicious and illegal HTTPS websites
.Data Leakage Prevention with web filtering and content filtering
.Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
.Controls legal liability
.Regulatory Compliance .Implements Internet Safety Policy
.Active member of Internet Watch Foundation (IWF), UK
.Prevents Data Leakage
.Enables CIPA compliance and supports E-Rate Funding
.Layer 8 Identity-based Controls .Username, group, work-requirement based policies
.Schedule-based access control
.User authentication through ADS, RADIUS, SSO, local and thin client
.High security with high flexibility
.Prevents productivity loss
.Integrates with a range of existing authentication mechanisms
.Best-of-breed Replacement .Offers single, per-appliance subscription as opposed to per-user subscription
.Custom messages to user with reason for blocked website
.Category-based bandwidth allocation and prioritization
.Data and bandwidth quota based on web categories and time of the day
.Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
.Educates users regarding best practices in web usage
.Ensures bandwidth to business-critical applications
.Prevents productivity loss