From Atera Wiki

Jump to: navigation, search

What is WebShield?

Most security products (such as firewalls, VPNs, and IDS/IPS) protect corporate servers from threats coming from the Internet.  Newer threats infect end users— who are accessing Internet resources—via bots, phishing, and malicious active content, all of which subsequently infect corporate networks. Corporations have done very little to inspect user-initiated traffic and protect their users.  WebShield shifts focus away from the server to the user, protecting companies from the new generation of security threats.  Through our global, in-the-cloud infrastructure, WebShield:

Enforces business policy and mitigates risk

Web 2.0 applications, such as business networking sites and blogs, create unique opportunities—they create communities of interest for marketing or forums for customer support.  However, they also create obvious challenges.  Users may inadvertently download malicious content; they may create liability by publishing inappropriate or confidential content on blogs and social networks. WebShield empowers organizations to manage access to Web 2.0 applications, while providing clean Internet traffic. 

Provides the end user with a rich Internet experience 

Each user should have safe, transparent, and rapid Internet access.  WebShield protects users against a range of threats, including bots, phishing, and malicious active content.  No configuration changes are required by the user-end, making access transparent.  Finally, WebShield minimizes latency to provide rapid response time.

Protects users at any place, on any device

The traditional enterprise border is breaking down with the increase in road warriors and smartphone users.  When these users access the Internet, however, they often bypass all security controls.  WebShield protects every user—regardless of location or device. <o:p></o:p>

Delivers twice the functionality at half the price 

Current solutions require the acquisition, deployment, and management of at least half a dozen point products at each Internet gateway.  This solution is not only impractical, but it is expensive and introduces latency.  WebShield provides a high performance solution at low TCO.

Getting Started with WebShield Web Security



Reporting and Visualizations 

Advanced Traffic Forwarding

Advanced User Administration


A – Table of URL Categories

B – Configuring GRE for WebShield Web Security

C – Writing a PAC File for WebShield Web Security

D – Proxy Chaining

E – Port Forwarding

F – Standard Instructions for Creating Rules

G – Federated Identity and Security Assertion Markup Language

H – Pre-Provisioned Cookies

I – Getting Started With Sub Locations

J – Getting Started With Role Based Reporting
K – Getting Started With Temporary Authentication

Personal tools