IBG | InSIST Global InSIST IBG

What is it about?

InSIST Business Gateway makes your day-to-day network usage easier. It helps to keep your network clean, providing fire-walling capabilities. IBG has the most effective , sophisticated and easy web filtering technologies, that is currently helping businesses prevent intrusion attacks.

Solutions

IBG

IBG

InSIST Business Gateway makes your day-to-day network usage easier. It helps to keep your network clean, providing fire-walling capabilities. IBG has the most effective , sophisticated and easy web filtering technologies, that is currently helping businesses prevent intrusion attacks.

Features

  • Web Filter: IBG Web Filter monitors and block inappropriate web contents. Web Filter also appeals to customers who require an added level of protection or are subject to regulations. Need to block Pornography, Hate Speech, etc, on your network? Web Filter is your answer.
  • Firewall: IBG Firewall blockS and/or flaggs traffic based on rules.
  • Application Control: Application Control also inspects network traffic. It identifies thousands of today's common applications such as Social Networking, P2P, Instant Messaging, Video Streaming, File Sharing, Enterprise Applications, Web 2.0 and much more and BLOCK or ALLOW them.
  • Policy Manager: Policy Manager is one of IBG's most powerful features. It filters content based on time of the day, users, etc. Policy Manager allows you to create policy rules that send traffic to different groups. E.g. It may be decided that employees cannot access social media during work hours, etc
  • Reports: Reports provides users with detailed statistics of the traffic and activity on your network.
  • Virus Blocker: Virus Blocker scans your HTTP, FTP and SMTP traffic to protect your network from viruses, trojans and other malware. It scans within archives such as zip, rar, tar, gzip, bzip2 (and more). Virus Blocker Lite i s based on Clam AV. Clam AV is well-known for its speed and accuracy.
  • Phish Blocker: Phish Blocker protects users from phishing attacks over email. It inspects email for fraudulent emails, also known as phish. A phishing email attempts to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email.
  • Ad Blocker: Ad Blocker allows you to block a majority of advertising content that is delivered to users on web pages that they request.
  • Intrusion Prevention: Intrusion Prevention is an Intrusion Detection system that detects malicious activity on your network. To detect malicious activity, Intrusion Prevention uses signature detection, a method that draws upon a database of known attack patterns. If Intrusion Prevention detects malicious activity, the session for that activity is terminated.

Benefits

Pricing & Demo

Customers

Reliance Financial Services
GT Bank
First International Bank
Gambia Ports Authority