Website Design | Web Design | Custom Website Design | Website Application Development | Web Development | Software Development

 

Web Filtering    Complete Visibility & Control over HTTP & HTTPS
Cyberoam’s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 82+ categories. Available with the Cyberoam UTM and Cyberoam Wi-Fi Appliances range, it blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Cyberoam’s Layer 8 Identity-based policies offer granular web access controls, preventing data and productivity loss. Comprehensive web filter coupled with granular Layer 8 controls make Cyberoam Web Filtering the right choice for large enterprises and small organizations.

Back to Home
Feature Feature Description Benefit
Web Categorization
On-appliance database
Web filter with 82+ Web categories
Custom categories
Automatic updates through WebCat – The Website Categorization Engine
 
Lowers response time and reduces privacy concerns
 
 
Comprehensive and company-specific web filtering
 
Web Filtering Options
URL
Keyword
File type
Database
Comprehensive web filtering & content filtering
 
Web Security
Blocks third-party proxy and tunnelling software
Blocks Google cache pages
Blocks embedded URLs in websites
Enforces ‘safe search’ in search engines
Blocks malware, phishing, pharming URLs
Blocks Java Applets, Cookies, Active X
Integrated with Anti-Virus & Anti-Spyware and IPS to deliver comprehensive web & internet content filtering
 
 
 
Minimizes accidental and intentional bypass by preventing harmful websites from appearing in search results
 
 
 
HTTPS Controls
Visibility into encrypted HTTPS Traffic
Prevents unauthorized file upload and download over HTTP and HTTPS
 
Blocks unauthorized, malicious and illegal HTTPS websites
 
Data Leakage Prevention with web filtering and content filtering
 
Prevents misuse of this encrypted medium to carry out malware attacks and unauthorized data transfer
 
 
 
Controls legal liability
Regulatory Compliance
Implements Internet Safety Policy
Active member of Internet Watch Foundation (IWF), UK
 
Prevents Data Leakage
Enables CIPA compliance and supports E-Rate Funding
 
 
HIPAA
 
PCI DSS
Layer 8 Identity-based Controls
Username, group, work-requirement based policies
 
Schedule-based access control
User authentication through ADS, RADIUS, SSO, local and thin client
 
High security with high flexibility
 
Prevents productivity loss
 
Integrates with a range of existing authentication mechanisms
 
Best-of-breed Replacement
Offers single, per-appliance subscription as opposed to per-user subscription
 
Custom messages to user with reason for blocked website
 
Category-based bandwidth allocation and prioritization
 
Data and bandwidth quota based on web categories and time of the day
 
Right replacement for best-of-breed solutions with comprehensive, yet cost-effective security
 
 
 
 
Educates users regarding best practices in web usage
 
 
Ensures bandwidth to business-critical applications
 
 
Prevents productivity loss