Cisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, that develops, manufactures and sells networking hardware, telecommunications equipment, security solutions and other high-technology services and products. Cisco is currently the largest networking company in the world.
A Secure Internet Gateway (SIG) integrates critical security functions into a single cloud-delivered platform to accelerate threat detection and response, improve performance, and centralize management across locations and roaming users. A secure internet gateway provides better visibility and control for internet traffic. It significantly reduces the number of security tools and appliances in your environment and improves performance by enabling secure, direct-to-internet access. Providing all of this from one cloud console simplifies cloud security and reduces the strain on your limited security resources.
DNS & IP layer enforcement – Umbrella uses DNS to stop threats over all ports and protocols — even direct-to-IP connections. Stop malware before it reaches your endpoints or network.
Intelligent proxy – Instead of proxying all web traffic, Umbrella routes requests to risky domains for deeper URL and file inspection. Effectively protect without delay or performance impact.
Command & control callback blocking – Even if devices become infected in other ways, Umbrella prevents connections to attacker’s servers. Stop data exfiltration and execution of ransomware encryption.
Cisco Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems (ASNs), and file hashes. Accessible via web console and API, Investigate’s rich threat intelligence adds the security context needed to uncover and predict threats.
See how easy an Umbrella trial can be
Please visit our solutions page on DNS Security for further information.
As a new network manager to Fred Perry, I asked activereach to assist in our firewall migration work. They did a fantastic job of taking a previously outsourced service with no documentation and significantly improving security, working diligently and late into the evenings. At all times they kept me in the loop so that I could manage the system afterwards.