Security solution for secure work environment
Application Insight
Secure Web Gateway
Secure Web Gateway is a security solution that protects internal users from a variety of web-based threats.
Product Lineup
AISWG
Physical Appliance
AISWG-VE
Virtual Appliance
AIONCLOUD SWG
Cloud-Based Platform
Protect users and organizations against evolving web-based threats
Product Overview
MONITORAPP AISWG
A security solution that effectively controls web-enabled environments and protects enterprises from threats that can harm business assets and undermine corporate productivity.
As we work more and more through the Web, we are exposed to many websites that threaten asset and business productivity. Accessing non-business sites wastes valuable business hours, and visiting harmful websites with malicious codes may result in valuable corporate assets being taken away. In addition, improper web uploads information and leaks company assets easily. Secure Web Gateway (SWG) is the security solution for effectively controlling the use of the web itself to increase corporate productivity and protect business assets. The secure web gateway detects the harmfulness of the website you want to visit, checks for suspicious links, make sure that you access only the secure website, and prevents you from uploading files via the web.
AISWG is a security solution that ensures the secure web environment and work-efficiency of internal users by blocking access to malicious and non-business sites, including unwanted software and malicious code. In other words, decryption and control of HTTPS and HTTPS traffic are possible, blocks non-working sites with URL filtering linked to threat intelligence, and prevents information leakage through the Web.
Product Features
Ensure a secure network environment.
Efficiency
Prevent leakage of sensitive and personal data through various non-business and harmful site restrictions and application filtering
Technology
Patented Adaptive profiling technology and threat intelligence AILabs interworking to defend against unknown web attacks
Convenience
Provides User-centric policy settings policies per each user or group and user-specific statistics, and logs
Deployment
Provides a variety of configurations, including inline mode and reverse proxy mode, and delivers security services with the same performance as virtual appliance and SECaaS
Block all paths to malicious website.
AISWG defends against malicious code by blocking access to harmful and non-business sites through URL category filtering based on more than 1.4 billion URL DBs, while filtering URL catalogs to block harmful site access, or attachments containing malicious URLs. AISWG not only controls URL but also non-working and bypass applications. It protects personal information and corporate assets by blocking command-and-control communication by zombie PCs as well. AISWG works with AILabs(Application Insight Labs), a threat intelligence platform that monitors lab’s own, to increase the accuracy of URL filtering in real time. AILabs runs MUD (malicious url detection) system that can visit websites dynamically with high speed. AILabs collects, analyzes, updates, and automatically categorizes the malicious URLs from the sites it visits to reflect them in AISWG. It can also proactively respond to known vulnerabilities by providing information about Drive by Download vulnerabilities and others.
Prevent business losses.
AISWG increases business efficiency by monitoring internal client web access. Block access to non-working sites to reduce business loss. In particular, approximately 800 applications are controlled in 22 groups, including file transfer, remote access, VPN, Game, SNS, Mail, and Messenger. AISWG also has a function to prevent leakage of important internal information. It provides network-based DLP functionality to prevent leakage of personal information or internal documents of PC users.
Blocks critical internal information leakage.
AISWG monitors and analyzes all data transmissions over corporate networks. Through this, it quickly detects and blocks attempts to leak sensitive information through e-mail, file transfer, web forms, etc. AISWG’s Data Loss Prevention (DLP) detects file uploads through bulletin boards or web hard through specific keyword inspection and file size limitations, and prevents data leakage through Web-Mail. AISWG provides a template for information protection, such as social security numbers, by default, and allows users to set customized rules. In addition, the Web Mail Control function prevents data leakage through Web Mail by controlling the use of Web mail according to the company’s internal regulations. In addition, AISWG also prevent data leakage in computers due to malicious code infection.
Control SaaS Application usage
AISWG enhances data security by providing visibility and control over cloud-based SaaS applications and services, such as Office 365 and Google Workspace, that employees in the enterprise use. AISWG applies security policies for employees’ use of cloud services within the enterprise and monitors when sensitive data is stored or transmitted to the cloud.
Ensure performance and availability.
The patented Proxy Based Transparent Gateway Technology is configured without affecting the existing infrastructure and without assigning an IP. It guarantees high availability (HA) through redundancy. By limiting non-work-related traffic, you can increase overall network traffic availability.
SSL traffic controls enhance security
It provides all security functions including encryption and decryption for SSL traffic (HTTPS) on its own without a separate system and provides increased convenience for automatic certificate distribution for SSL encryption and decryption. Also, it improves security by providing a detection function for an invalid SSL certificate which is mainly used by C & C server or exploited web server.
A list of applications that cannot communicate through SSL due to certificate pinning is regularly updated. It also enables self-learning and bypassing by system settings apart from just the updated list, thus eliminating problems caused by certificate pinning.
Intuitive UI and various management features
Intuitive UI makes it easy to see what is happening in one glance. It helps you to set policies flexibly and easily by individual control rights to non-work-related sites, user-specific policy settings, exception URL settings and so on. You can also monitor real-time network traffic and system status.
X