iPrism Web Security offers flexible policy rulesets that allow you to manage your acceptable use and security policies with accuracy and granularity. It enables you to log both Web and application activity on your network and protect against security threats while minimizing productivity loss, mitigating bandwidth degradation and assuring your organization's compliance with regulatory requirements.
iPrism Web Security is the only Internet filtering solution on the market that uses a one-hundred percent human-reviewed ratings database, known as iGuard. Powered by a team of trained analysts and iPrism automated rating protocol (iARP™), iPrism delivers over 99% Web coverage with near 100% accuracy of the 10-20 million most frequently visited websites. Unlike other solutions that focus on rating quantity over quality, this minimizes false positives and assures that each site rated by iGuard has a higher degree of accuracy when compared to heuristic analysis or blended classification technologies, resulting in better enforcement of your acceptable use policy and increased ability to mitigate risks.
iGuard Analyst Team
A team of multi-lingual web content experts rates sites by domain, specific URL and/or general IP address into 70 categories using documented detailed criteria that also allows the creation of custom local categories for flexible policy setting. You receive daily database updates and hourly updates on sites that have contain security risks such as botnets, spyware, malware, and phishing. In addition to the typical categories for restricting access to adult content, gambling, dating and the like, iGuard also categorizes websites that offer anonymous browsing, so users can't avoid policy enforcement through circumvention; malware sites, to keep users from having their computers infected; and web-based email and IM sites so you can control personal email and IM use, if necessary.
Automated Rating Protocol
Another tool for defending against anonymous browsing is the proprietary iPrism Automated Rating Protocol (iARP™) feature. This adds more protection by compiling unrated URLs, accessed by your employees, and sending them to the iGuard team where they are analyzed, categorized and returned to your iPrism with your daily or hourly database updates. Learn more about iGuard
Award-Winning Inbound Malware Protection
iPrism Web Security offers onboard Antivirus with detection capabilities that have won awards from leading certification authorities, including VB 100, West Coast Labs and ICS. Even if you are already using an antivirus solution, our antivirus adds another layer of security by scanning all incoming HTTP traffic and blocking malware before it can reach your end-users.
Anonymous Proxy Detection
Anonymous proxy sites are pervasive and easy to build. The Internet landscape is littered with sites that offer proxy site-building scripts and instructions for enabling them via free hosting services. The frequency with which purveyors of this circumvention technique are able to erect these sites has made the conventional defenses of many Web security solutions ineffective. As soon as one site is located and blocked, another one emerges. iPrism's dynamic script-based (i.e. PHProxy, CGIProxy) proxy site detection helps thwart these circumvention attempts by identifying proxy sites on the fly, giving you much better defense against this difficult threat. Learn more about Anonymous Proxies
iPrism Leverages the Botnet Threat Index
iPrism Web Security leverages its unique botnet technology to prevent bots from 'phoning home' by contacting command and control hosts outside your network. Once a bot has been detected and blocked, administrators can be alerted via Email Alerts or Real-Time Monitor so they can later remediate compromised endpoints with the security of knowing that the immediate threat has been mitigated. iPrism on-box reporting will show compliance with regulations that protect users' identities and data. Learn more about Outbound Anti-botnets
EdgeWave Circumvention Defense Network
iPrism's new Circumvention Defense Network blocks attempts by client-side circumvention tools to connect to their network of proxy or re-routing servers, rendering them harmless and protecting your organization from the damage circumvention can cause including regulatory compliance infractions, data leakage and exposing your network to security breaches. Once the circumvention threat has been blocked, iPrism's Email Alerts and Real-Time Monitor features can be used to address the transgressors and take more serious action if required. iPrism's historical reporting features can document that regulatory compliance, your acceptable use policy and security policies are being enforced. Learn more about Circumvention Defense
Protocol Pattern Detections
Detects 10s of client-side applications (potentially 100s of different versions) sharing a standard protocol for comprehensive application control including IM, P2P and FTP protocols:
- Instant Messaging (IM) application protocols over any port including Skype
- Peer-to-Peer (P2P) application protocols over any port
- File Transfer Protocol (FTP) over any port