Threat & Event Console Overview
Ensure Regulatory Compliance: CIPA, HIPAA, PCI, SOX, and FISMA
The growing sophistication of cyber threats including malware and data loss along with new potential of network peripherals ‘phoning home’ have eroded the effectiveness of current log based threat detection and reporting. iboss Threat & Event Console changes how we approach threat identification and mitigation by addressing who and where you're connecting to from simply what. By utilizing exclusive features such as threat GeoMapping and heat maps technology, iboss Threat & Event Console provides instant visual insight to pinpoint threats across a global map. This system increases insight, shortens mitigation response and reduces the total cost of ownership (TCO).
Compliance and reporting requirements create a need to store Internet and user activity logs for extended periods. In addition, dynamic access to this data is required to identify and resolve obscure threats lurking in the logs. Reliance on static reports and logs creates difficult, time-consuming searches.
By proactively indexing and archiving network data as it is developed, iboss Reporter and Log Management provide administrators instant access to detailed user information regardless of whether it occurred yesterday or a year ago. These tools give network administrators instant insight on user activity, threats, and the consumers using the network’s resources. Gone are the days of cumbersome reporting!
The need for dynamic access for data becomes a growing concern for organizations as static report generation does not provide the flexibility to compare and contrast information in a reasonable time frame. iboss Reporter provides dynamic indexing of data and sorts it into a drill down archive. This provides access to all events for the day, with the ability to instantly jump to compare throughout the year.
With the powerful indexing features of the iboss Reporter, access to any and all events are provided through a dynamic drill-down interface that reveals user details. This dynamic access creates new ways on how network activity can be used. Instantly create analytical comparisons between date ranges for bandwidth or user activity, identify trends brewing on the network, or utilize for forensic style investigations.
Threat & Event Console expands network insight to provide packet level detail tracking violations, threat and bandwidth GeoMapping, data loss, intrusion , and bandwidth consumption. Easily view activity and violations from entire groups to individual users. User based reports detail all port, application, and IP accesses to and from the network. Detailed graphs and heat maps provide information on user and traffic allowing network administrators to adjust network layouts, customize ?filtering, and identify risk before they become a problem. This is essential to for compliance as well as mitigating threats.
This reports web usage and statistics such as bandwidth activity, web category usage, top visited domains, top blocked domains, and last visited sites — all with drill down details. This information is provided down to the user.
Take the next step towards
a Secure Web
Gateway at your
SC Magazine Best Buy
Quality of Service
Allowing a limited
bandwidth to specific
groups & users...
Clustering Filters & Load Balancing
allows live clustering between
one or multiple