Техническая Спецификация для Panda Cloud Internet Protection 3Y B3CIPADB
Модели
B3CIPADB
Overview
Cloud Internet Protection’s in-the-cloud security services enable
organizations to enforce business policy and mitigate risk, while
providing every user with a rich Internet experience from any
place and on any device. Cloud Internet Protection delivers twice
the functionality at half the cost of current solutions through a
multi-tenant, globally deployed infrastructure.
organizations to enforce business policy and mitigate risk, while
providing every user with a rich Internet experience from any
place and on any device. Cloud Internet Protection delivers twice
the functionality at half the cost of current solutions through a
multi-tenant, globally deployed infrastructure.
Emerging Web 2.0 Challenges
Most of today’s security products—such as firewalls, VPN,
IDS/IPS—protect corporate networks and servers from threats
coming from the Internet. Newer threats such as bots, phishing
and malicious active content attack users as they use the Internet
and subsequently infect corporate networks. Other than deplo-
ying caching and URL filtering products, corporations have done
very little to inspect web traffic and protect their users.
IDS/IPS—protect corporate networks and servers from threats
coming from the Internet. Newer threats such as bots, phishing
and malicious active content attack users as they use the Internet
and subsequently infect corporate networks. Other than deplo-
ying caching and URL filtering products, corporations have done
very little to inspect web traffic and protect their users.
In addition, Web 2.0 applications such as social and business
networking create both opportunities and challenges for today’s
organizations. They help create communities of interest for
marketing, but can also create risks when users inadvertently
download malicious content, or liability when employees publish
inappropriate or confidential content on blogs and social networ-
ks. Road warriors and smartphone users further exacerbate this
problem—their access to the Internet often bypasses all security
controls.
networking create both opportunities and challenges for today’s
organizations. They help create communities of interest for
marketing, but can also create risks when users inadvertently
download malicious content, or liability when employees publish
inappropriate or confidential content on blogs and social networ-
ks. Road warriors and smartphone users further exacerbate this
problem—their access to the Internet often bypasses all security
controls.
Current solutions require the acquisition, deployment, and
management of multiple point products at each Internet
gateway—an expensive proposition.
management of multiple point products at each Internet
gateway—an expensive proposition.
Cloud Internet Protection’s in the-cloud service or Software-as-a-
Service (SaaS) for the Internet-bound traffic is the best way to
provide secure and managed access to users.
Service (SaaS) for the Internet-bound traffic is the best way to
provide secure and managed access to users.
Defining In-the-Cloud Security
SaaS has been made popular by companies such as
Salesforce.com, NetSuite, and Google. A major reason these
companies have been successful managing tremendous growth
and being cost-effective is that they developed platforms and
applications specifically for SaaS.
Salesforce.com, NetSuite, and Google. A major reason these
companies have been successful managing tremendous growth
and being cost-effective is that they developed platforms and
applications specifically for SaaS.
Cloud Internet Protection has done the same for in-the-cloud web
security. The Cloud Internet Protection Cloud is purpose-built to
meet the latency, multi-tenant, global footprint, and reporting
requirements that in-the-cloud security solutions demand.
Traditional web proxies and reporting solutions designed for
enterprise deployments cannot be repurposed to meet these
requirements. The key driver of SaaS offerings are savings associa-
ted with not having to deploy or manage systems and software in
an organizations network or end points. This is particularly
challenging with web security since the web traffic has to be
redirected to the service from both LANs and mobile devices
(laptops, smart phones), users always need to be authenticated,
and directory integration is necessary.
security. The Cloud Internet Protection Cloud is purpose-built to
meet the latency, multi-tenant, global footprint, and reporting
requirements that in-the-cloud security solutions demand.
Traditional web proxies and reporting solutions designed for
enterprise deployments cannot be repurposed to meet these
requirements. The key driver of SaaS offerings are savings associa-
ted with not having to deploy or manage systems and software in
an organizations network or end points. This is particularly
challenging with web security since the web traffic has to be
redirected to the service from both LANs and mobile devices
(laptops, smart phones), users always need to be authenticated,
and directory integration is necessary.
Cloud Internet Protection is in the unique position of being the only
service that requires no on-premise hardware or client software to
address these challenges. Cloud Internet Protection can redirect
traffic and authenticate end users to properly report and apply user
and group level policy for any device from any location.
service that requires no on-premise hardware or client software to
address these challenges. Cloud Internet Protection can redirect
traffic and authenticate end users to properly report and apply user
and group level policy for any device from any location.
Remote office
Headquarters
Road Warrior
Cloud Internet Protection
UNIFIED
POLICY
SECURE
COMPLY
ANALYZE
MANAGE
Public Internet
Defining In-the-Cloud Security