× Business
TelecomHealthcareDigital MarketingERPRetailMedia and EntertainmentOil and GasFood and BeveragesMarketing and AdvertisingBanking and Insurance
Technology
Big DataCloudIT ServiceSoftwareMobileSecurityNetworkingStorageCyber SecuritySAPData AnalysisloTBio Tech
Platform
Cisco DATABASE Google IBM Juniper Microsoft M2M Oracle Red hat Saas SYMANTEC
Leadership
CEO ReviewCMO ReviewCFO ReviewCompany Review
Magazines
US INDIA ASIA ARCHIVE
Startups Opinion Yearbook Readers Speak Contact Us

Cisco introduces its Cloud-based secure internet gateway

siliconreview Cisco introduces its Cloud-based secure internet gateway

Global networking giant ‘Cisco’ recently gathered headlines with the launch of its Cloud-based secure internet gateway "Umbrella" that offers visibility and protection against threats wherever users work. A secure internet gateway (SIG) offers protected access to the internet anywhere users go, even when they are off the VPN and provide the first line of visibility and defense regardless of where users are located or to what they're trying to connect.

To shed more light on this, David Ulevitch, Vice President, General Manager, Security Business Group, Cisco Systems, said "Our secure internet gateway, Cisco Umbrella, can protect today's enterprise and beyond as mobility increases and new cloud services are adopted."

Well, Umbrella can do wonders; it is capable to stops current and developing threats over all ports and protocols for the most comprehensive coverage. Also, it blocks access to malicious domains, URLs, IPs, and files before a connection is ever established or a file downloaded. By uniting "Umbrella" with Cisco Cloudlock's Cloud Access Security Broker technology, Cisco will be help organisations to identify which SaaS apps are being used and and it also can impose policies to hunk risky or inappropriate apps.

"Umbrella" can integrate with existing systems, including security appliances, intelligence platforms or feeds, and custom, in-house tools which enable users to extend protection for devices and locations beyond the perimeter. It also resolves over 100 billion internet requests every day and correlates this live data with over 11 billion historical events. This is analyzed to identify patterns, detect anomalies, and create models to automatically uncover attacker infrastructure being staged for the next threat," the company said in a statement.

YOU MIGHT ALSO LIKE::

ENROLL FOR UPCOMING ISSUE