Avast Business Secure Internet Gateway (SIG) is a revolutionary, cloudbased, and unified threat management solution that replaces the need for traditional on-premise appliances. SIG delivers enterprise-grade protection to keep small and midsize businesses safe from today’s increasingly sophisticated cyber-criminals. Using advanced security techniques, Secure Internet Gateway provides reliable, always-on protection from web and internet threats across all devices, locations, and users.
Secure Internet Gateway
Provide Enhanced Security
Avast Business’ Secure Internet Gateway (SIG) provides a full security stack with all the in-depth security layers you’ll ever need. Offered as a service from the world’s largest security cloud, SIG provides fast and deep packet inspection across all ports and protocols – including SSL encrypted traffic.
Reduce Total Cost of Ownership
Our cloud based solution lets you break free from expensive hardware security appliances, hardware maintenance upgrades, complex management, and the associated costs of backhauling traffic to and from remote offices. SIG works with your existing network, so there’s no additional hardware to buy, deploy, or manage.
Secure All Users
Provide total protection for all users with always-on, cloud-based internet security that pulls data from over 60 threat feeds, processes more than 65 billion transactions per day, and pushes out 125,000 updates daily to over 150 data centers and counting. Protect your mobile and work-from-home users simply by installing an app that is compatible with all operating systems.
Scale Infinitely
Set up new locations remotely in just hours instead of days, from one central dashboard. When expanding to new offices, simply create a new location and assign rules. Then, you’re ready to go! Unlike security appliances, Avast SIG automatically scales to your customers’ bandwidth and capacity requirements.
Streamline Administration
Monitor multiple locations and roaming users from a unified cloud console. Flexible policies help deploy security services, manage firewall rules, provide real-time visibility, and drill down to a per-user overview to correlate events and remediate threats.
Chad Strader
President Kappa ServicesNorman Landerman
SDSIJulian Jacquez
BCN President and COOCloud Security Platform
Secure Internet Gateway is delivered by a next-generation security architecture built from the ground up for performance and scalability. It is distributed across more than 150 data centers on 6 continents, so performance from any location is lightning fast, and you’ll never run out of capacity.
|
SIG
|
SIG Advanced
|
SIG Total
|
---|---|---|---|
Cloud Security Platform
|
|||
Data Centers
Global access, high availability, witwh latency SLAs. |
|
|
|
Automated, real time updates
Over 125,000 daily updates with over 60 threat feeds. |
|
|
|
Granular Policies that follow users everywhere in the world
|
|
|
|
Authentication
SAML, Secure LDAP, Kerberos, hosted. |
|
|
|
Client Application to secure mobile devices (Windows, Mac, Android)
|
|
|
|
Traffic forwarding
GRE tunnel, IPSEC, PAC, Proxy Chaining or Client Connector |
|
|
|
Service Level Agreement (SLA) for High Availability and Low Latency
|
|
|
|
SSL Inspection
|
|||
Full inline threat inspection of all SSL/TLS traffic with SLA and granular policy
|
|
|
|
URL and Content Filtering
|
|||
Filter by policy across 6 classes, 30 super-categories, 90 categories
|
|
|
|
Dynamic content classification for unknown URLs and Safe Search
|
|
|
|
Granular policy by users, groups, locations, time and quota
|
|
|
|
Inline Anti-virus & Anti-spyware
|
|||
Signature based anti-malware protection and full inbound/outbound file inspection
|
|
|
|
Cloud Application Visibility & Control
|
|||
Discover and monitor web applications (Streaming, Social, mail, etc.)
|
|
|
|
Granular web application controls
|
|
|
|
Cloud Identity Broker
|
|
|
|
Mobile Application Reporting and Control
|
|||
Granular policy and reporting of mobile applications and devices
|
|
|
|
Cloud Firewall
|
|||
Standard Cloud Firewall
Rules by locations, IP, ports and protocols |
|
|
|
Advanced Cloud Firewall
Full Outbound Layer 7 cloud firewall and IPS |
|
|
|
Full Firewall Logging
Detailed Logs, statistical reporting and dashboards |
|
|
|
Web Access Control
|
|||
Ensure outdated and vulnerable browsers and plug-ins are compliant
|
|
|
|
Bandwidth Control
|
|||
Protect key apps and limit recreational apps by location or time of day
|
|
|
|
Advanced Threat Protection
|
|||
Real-time feeds for reputation blocking of phishing sites and botnets
|
|
|
|
Blocking malware, spyware and malicious sites
|
|
|
|
Cloud IPS advanced threat signature blocking for HTTP and HTTPS
|
|
|
|
Stop Cross Site Scripting (XSS), cookie stealing and malicious active content
|
|
|
|
Cloud Sandbox
|
|||
Standard Cloud Sandbox: Zero day protection for .exe and .dll from unknown and suspicious sites
|
|
|
|
Advanced Cloud Sandbox: Zero day protection for all file types, Quarantine by policy, detailed reports
|
|
|
|
Real-time Reporting and Logging
|
|||
6 months, globally correlated real-time interactive reporting
|
|
|
|
Stream to on-premise SIEM (Nanolog Streaming Service w/Live Management)
|
|
|
|
Data Loss Prevention
|
|||
True file type control by users, groups and destinations
|
|
|
|
Advanced Inline Scanning DLP to prevent data leaving the organization
|
Add-on | Add-on |
|