Introduction

1.5

The Webwasher Web Gateway Security Products

The Webwasher Web Gateway Security products provide an optimal solution for all your needs in the field of Web gateway security.

They are unique in that they offer best-of-breed security solutions for individual threats and at the same time a fully integrated architecture that affords in-depth security and cost/time savings through inter-operability.

A brief description of these products is given in the following.

Webwasher® URL Filter

Webwasher® Anti-Virus

Webwasher® Anti-Malware

Webwasher® Anti-Spam

Webwasher® SSL Scanner

this

product

Helps you boost productivity by reducing non-business related surfing to a minimum, thus curbing your IT costs. Suppresses offensive sites and prevents downloads of inappropriate files, thus minimizing risks of legal liabilities.

Combines the strength of multiple anti-virus engines concurrently scanning all Web and e-mail traffic. The Proactive Scanning filtering technology additionally detects and blocks unknown malicious code, not relying on time-delayed virus pattern updates. This combination provides in-depth security against a multitude of threats while offering unmatched performance through use of the Anti-Virus PreScan technology.

Offers in-depth security against all kinds of malicious code, such as aggressive viruses, potentially unwanted programs, spyware, day-zero attacks and blended threats not covered by traditional anti-virus and firewall solutions. The highly efficient anti-malware engine is used in combination with the Proactive Scanning filtering technology.

Offers complete protection of the central Internet gateway. The highly accurate spam detection filters stem the flood of unwanted spam mail before it reaches the user’s desktop. Your systems will not be impaired, the availability of valuable internal mail infrastructures, such as group servers, is thus maintained.

Helps you protect your network against attacks via the HTTPS protocol and prevents the disclosure of confidential corporate data, as well as infringements of Internet usage policies, thus ensuring that no one is illicitly sharing sensitive corporate materials.

See next page

1–14