We found that CensorNet takes a really unique approach where it comes to designing its solutions – it’s different from the traditional products that competitors offer and leads to much more flexible protection.

GertJan MinkelsSolutions Architect - Cloetta

Unified Security Service

 CensorNet USS provides visibility across vital security points within the business and maximum insight and control through one viewpoint.

undefined

Cloud Application Control
Gain visibility inside all cloud applications see uploads, usage, and suspicious activity and set appropriate controls.

DIVE IN DEEPER

undefined

Web Security
Provide complete security policy protection seamlessly for the entire workforce inclusive of any device. 

DIVE IN DEEPER

undefined

Multi-Factor Authentication
Adaptive and user-centric authentication using contextual intelligence to ensure highly secure user authentication.

DIVE IN DEEPER

undefined

Email Security
Multi-layer security against attacks including targeted attacks like phishing and ransomware.

DIVE IN DEEPER

Advanced Analytics across Web, Email and Applications

Complete visibility of what is happening on your network and the ability to alert and track data across email, web and cloud based applications. For example, you can see a file downloaded from Salesforce, files uploaded to Dropbox, or files shared on social media.

Cloud Application Visibility
Cloud Application Visibility

USS shows all the cloud applications that are being used on your network; those you know about and those you don’t. With USS you can drill down into the application activity by individual user, device and URL, and uniquely identify actions performed like message posts, and file uploads. In this way you can make an accurate assessment of any risks. From one console it is easy to get a view of all the cloud applications being used over your network –  authorized and unauthorized – who is using them and what for, even looking into the content of any suspicious or risky activity.

Explore Cloud Application Control
Cloud Application Control
Cloud Application Control

Set cloud application access policies at a granular level based on the individual or their role, the device being used, the function within the application and the location of the user. Control who can access which applications, what they can do with them depending on where they are and the time of day. This means that someone can have access to an application that contains sensitive data as view only when they are using a tablet in an airport, but be able to download or print when using their laptop at their desk and connected to the corporate network. By downloading the CensorNet USS agent to users’ laptops or routing devices through the USS gateway the use of cloud applications can be controlled in and out of the office.

Explore Cloud Application Control
Safe from Malware
Safe from Malware

All emails and web traffic are scanned and threats blocked from accessing the network by using multiple layers of security (online threat detection, reputation and heuristics across multiple platforms). Deep HTTPS inspection allows even SSL encrypted content to be scanned for malware.  The powerful link scanning function ensures that only legitimate links are forwarded in emails, stopping this method commonly used for Phishing and ransomware attacks.

Explore Email Security
Less Admin for the Admin
Less Admin for the Admin

Manage web and cloud application access for corporate networks, branch office networks, stand-alone computers, remote workers, guest users and BYOD access to the corporate network from one place and leverage your existing directory like Microsoft Active Directory (AD) or LDAP for user admin and updates.

Fast, Unobtrusive and Scalable
Fast, Unobtrusive and Scalable

USS uses a proxy-less approach which reduces latency and preserves the user’s real IP address. This ensures privacy for the user by allowing the browser to maintain direct communication with the designated website, as long as that website is approved for access by that user. This enables mobile devices with GPS to take advantage of cloud applications that use location information, without causing an identity theft false alarm, or error messages for mobile employees when they are remote from the IT team. This ensures that websites using location awareness deliver the correct services to the user.

USS is a cloud-based security solution that scales instantly to suit your growing organization, adding new networks, offices, users and devices easily from the portal.  

Why You Need Unified Security

As business applications move to the cloud, so too are the threats, bypassing security at the corporate perimeter. You need a unified view of all the risks facing your organization so you can stop them before they result in a data breach or other damage.

Attacks come from all directions at once, from phishing emails and infected websites to social engineering. A defense that works seamlessly across all the routes of attack is needed.

undefined

undefined

Why choose CensorNet?

Selecting a security platform is an important decision

Our Unified Security Service is the only security platform that offers web filtering, email scanning, and cloud application control (CAC/CASB) in one single secure solution. All this is protected by user authentication, making life so much simpler! 

CensorNet enables you to monitor and control web, email and cloud application use, and provides your employees – whether in the office or mobile – with sophisticated 360-degree threat protection against cyber-attacks and accidental or malicious leaks of sensitive information.

The proxy-less architecture provides a fast and unobtrusive user experience that doesn’t hinder productivity or cause frustration. It is a cloud solution that meets your immediate needs and scales easily, without needing costly integrations or customizations to meet your goals.

360° Security - How do we do this?

Real-time anti-malware scanning at the network perimeter
Incorporating multiple layers of security including online threat detection, reputation and heuristics.

Scanning all inbound and outbound email
With multiple layers of protection, spam detection, phishing detection, multiple virus engines and content scanning.

URL Reputation 
For over 140 categories of web content - Covering billions of web pages in multiple languages; constantly updated for accuracy and protection. Includes Internet Watch Foundation (IWF) illegal site database and Home Office Counter Terrorism list as well as malware, phishing and compromised sites.

Automatic Unknown URL Classification 
Zero Day URLs are classified in real-time to ensure only acceptable content can be accessed.

HTTPS Inspection 
Control access to SSL encrypted content. Deep HTTPS inspection allows SSL encrypted content to be scanned for malware. Available on the USS Gateway component.

Anonymous Proxy Detection 
Preventing access to anonymous proxy sites.

Safe Search 
Enforcing safe search mode on popular search engines such as Google, Yahoo, Bing and YouTube. YouTube and Google App Restrictions are also supported.

BYOD Access Control 
Supporting BYOD by safely allowing BYOD access to the network via the built-in Captive Portal feature.

URL Overrides 
Administrators can maintain their own URL categories. These can be applied to create overrides and exceptions within filter policies; setting blocks to a category of websites but allowing specific exceptions.

Cloud Application Discovery 
Detecting cloud application usage and activity and revealing which applications are in use.

Sophisticated Policy Engine 
Attaching policies to users based on who they are, what Active Directory (AD) group they belong to, which device they are using, the type of device and the network they are connected to, and enforcing cloud application control down to specific actions within an app.

Cloud Application Risk Scoring 
Based on interception of web traffic and SSL inspection to provide a risk score.

IT Administration/Access Control

Sophisticated Policy Engine - Includes numerous different actions based on Active Directory (AD) attributes, device IP and MAC address, device type, tag and time.

Time Schedule - Policies can be applied on a rolling 7-day time schedule.

User Synchronization - Active Directory (AD) synchronization service ensures changes to Active Directory are replicated.

User Interface - A modern, clean and rich user interface provides an easy to use administration panel.

Advanced Role-based Access - Allows creation of multiple administrators with different levels of access to the administration interface.

Customized Notification Pages - Brand the notification pages (such as Access Denied, Captive Portal, etc.) with text, logo and terms of service information and spam quarantine notifications and disclaimers.

Reporting

Real-time Visibility - Productivity charts display instant visibility on compliance with defined access policies. Query in real-time web activity and cloud application use by user, domain, group and category. See exactly which users are doing what and drill down into activities that are triggering policy violations.

Report Builder - Administrators can customize their own reports based on many different criteria such as; time span, user, type of violation, device type. Reports can be saved and then exported to Excel or PDF. Even advanced automated reporting can be configured for admins to receive emails with customized reports.

Top Trend Reports - A selection of pre-defined trend reports with chart and table data.

Forty-two pre-set charts across malware, cloud applications, web and email services.

Email, Web and Cloud Application Logging - Analysis and reporting by user, group, application, device and action that covers more than one protocol. Provides the ability to monitor suspicious activity in one place with the logs already combined.

Architecture

undefined

Deployment

Software for Networks - Available as a download, CensorNet’s Cloud Gateway software can be deployed on a virtual or physical server in less than 30 minutes to extend security policies to your entire network.

Agent Software for Roaming Users or Standalone Devices - A Microsoft Windows and Mac OS X agent that enforces policies on the device. Tamper-proof and simple to deploy either with an install wizard or scripted via Active Directory (AD) Group Policy.

Email Security deployment is via a simple domain redirection.

Scalable - Highly optimized for large networks with global infrastructure and multiple data centers meaning that data at rest can be kept within a specific geographic region.

Deployment Modes - A gateway at the network that captures all traffic from domain, non-domain, guests and even BYOD devices. This can be set up to be a direct proxy set by an AD-group policy or specified in a WPAD file and agents for mobile and roaming users.

WPAD Support - Automatic creation of Web Proxy Automatic Discovery (WPAD) file based on network configuration.

WCCP Support - Deploy multiple gateways using WCCP.

Captive Portal - Allows existing domain users to access the network even if they bring their own devices (BYOD) and log in from those devices with valid user credentials.

Guest Portal - Enables your visitors to safely access your Wi-Fi and protects your network from any malware they may inadvertently bring in.