Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

+1 -800-456-478-23

Consolidate and simplify through a single cloud-delivered security service.

Cut complexity, reduce risk exposure, and improve performance using a single cloud-delivered dashboard. It deploys seamlessly and easily and is built to scale with your business.
Today’s hybridised working environment, paired with other factors such as high cloud application usage, has facilitated a shift for security teams. With these shifts, centralised security policy enforcement diminishes, and the risk of successful cyberthreats increases. Many organisations use separate points solutions to handle these escalating threats, but this approach can be difficult to integrate and manage. This is where SASE — secure access service edge — can be a game-changer. SASE is the convergence of several disparate security technologies into a single cloud-delivered platform, simplifying deployment and management of threat prevention.
Key Features and Benefits

By enforcing security at the DNS and IP layers, block requests to malicious and unwanted destinations before a connection is even established — stopping threats over any port or protocol before they reach your network or endpoints.

  • The visibility needed to protect internet access across all network devices, office locations, and roaming users.
  • Detailed reporting for DNS activity by type of security threat or web content and the action taken.
  • Ability to retain logs of all activity as long as needed.
  • Fast rollout to thousands of locations and users to provide immediate return on investment.

Cloud-based full proxy that can log and inspect all of your web traffic for greater transparency, control, and protection. IPsec tunnels, PAC files and proxy chaining can be used to forward traffic for full visibility, URL and application-level controls, and advanced threat protection.

  • Content filtering by category or specific URLs to block destinations that violate policies or compliance regulations.
  • The ability to efficiently scan all uploaded and downloaded files for malware and other threats using the Cisco Secure Endpoint engine and third-party resources.
  • Cisco Secure Malware Analytics rapidly analyses suspicious files (unlimited samples).
  • File type blocking (e.g., block download of .exe files).
  • Full or selective SSL decryption to further protect your organisation from hidden attacks and time-consuming infections.
  • Granular app controls to block specific user activities in select apps (e.g., file uploads to Dropbox, attachments to Gmail, post/shares on Facebook).
  • Detailed reporting with full URL addresses, network identity, allow or block actions, plus the external IP address.

Data loss prevention analyses sensitive data in-line to provide visibility and control over sensitive data leaving your organisation.

  • Easy enablement as part of Umbrella secure web gateway.
  • 80+ built-in content classifiers including PII, PCI, and PHI.
  • Customisable built-in content classifiers with threshold and proximity to tune and reduce false positives.
  • User-defined dictionaries with custom phrases (such as project code names).
  • Detection and reporting on sensitive data usage and drill-down reports to help identify misuse.
  • Inspection of cloud app and web traffic content and enforcement of data policies.

Cloud-delivered firewall provides visibility and control for traffic that originated from requests going to the internet, across all ports and protocols.

  • Deployment, management and reporting through the Umbrella single, unified dashboard.
  • Customisable policies (IP, port, protocol, application and IPS policies).
  • Layer 3 / 4 firewall to log all activity and block unwanted traffic using IP, port, and protocol rules.
  • Layer 7 application visibility and control to identify thousands of applications and block/allow them.
  • Intrusion prevention system (IPS)* to examine network traffic flows and prevent vulnerability exploits with an added layer of threat prevention using SNORT 3 technology and signature-based detection.
  • Detection and blocking of vulnerability exploitation.

DELTA SIG helps expose shadow IT by detecting and reporting on cloud applications in use across your environment. Insights can help manage cloud adoption, reduce risk and block the use of offensive or inappropriate cloud applications.

  • Reports on vendor category, application name, and volume of activity for each discovered app.
  • App details and risk information such as web reputation score, financial viability, and relevant compliance certifications.
  • Cloud malware detection to detect and remove malware from cloud-based file storage applications and ensure that applications remain malware-free.
  • Ability to block/allow specific apps.
  • Tenant restrictions to control the instance(s) of SaaS applications that all users or specific groups/individuals can access.

Secure Malware Analytics combines advanced sandboxing with threat intelligence into one unified solution to protect organisations from malware. By leveraging Secure Malware Analytics, security analysts can uncover malicious domains, IPs, ASNs and files to get the most complete view of an attacker’s infrastructure, tactics, and techniques.

  • Ability to detect hidden attack methods and report on malicious files.
  • Single, correlated source of intelligence to speed threat hunting and incident response.
  • Simple APIs to integrate with your SIEM for enriching security data.
  • Ability to predict unknown threats using real-time threat intelligence.
  • Automated alerts for retrospective events.

By isolating web traffic from the user device and the threat, Umbrella remote browser isolation (RBI) delivers an extra layer of protection to the Umbrella secure web gateway so that users can safely access risky websites.

  • Isolation of web traffic between user device and browser-based threats.
  • No performance impact on end users.
  • Protection from zero-day threats.
  • Granular controls for different risk profiles.
  • Rapid deployment without changing existing browser configuration.
  • On-demand scale to easily protect additional users on all devices, browsers, and operating systems.

Backhauling internet bound traffic from remote sites is expensive and adds latency. Many organisations are upgrading their network infrastructure by adopting SD-WAN and enabling direct internet access (DIA). Eighty percent of organisations extensively or selectively use SD-WAN today.

Simple and rapidly deployment options available for your network. Gain powerful cloud-delivered security to protect against threats on the internet and secure cloud access.

Get in touch today

Empower Your Identity:
Strengthened Security, Seamless Access.