We now supply, as standard, a Web/Internet protection product. This protects machines on and off the network from gaining access to sites that are responsible for delivering malware, drive-by downloads, and other forms of threats. The recent Cryptolocker or Cryptorbit scam that encrypts files and holds you to ransom for the decryption key is a good example. It can also prevent access to many categories of sites if needed.
We are very strongly recommending this service to all new clients, and to date everyone is using it. Since we put it in place virus interceptions by the Endpoint Protection (Antivirus) software has dropped by 95%. The licencing is £1.70 per person per month.
We can set this service up for your network immediately. It is relatively easy to do and we can most likely do the configuration for free. We grant you full access and visibility to the console with your own log-on if needed.
Predict and prevent attacks before they happen
A cloud-delivered network security service, that delivers automated protection against advanced attacks for any device, anywhere.
The most important part of this service is protection against the following:
|Malware||Malicious software including drop servers and compromised websites that can be accessed via any application, protocol or port.|
|Drive-by Downloads/Exploits||Websites and files that are designed to run code without user intervention.|
|Mobile Threats||Threats that are designed to infect or adversely affect mobile devices such as phones and tablets.|
|Suspicious Response||Public DNS entries that resolve to your internal network space. These are sometimes associated with DNS rebinding attacks, which allow malicious scripts to access your internal network resources.|
|Dynamic DNS||Sites that are hosting dynamic DNS services. This technology can be used by attackers as an evasion technique against IP blacklisting.|
|Botnet||Compromised devices that attempt to communicate with hackers’ command and control servers via any application, protocol or port.|
|Phishing||Fraudulent websites that aim to trick users into handing over personal or financial information.|
|High Risk Sites and Locations||Domains and hostnames that are matching against our predictive security algorithms from the Security Graph.|
There is also an Intelligent Proxy that enhances security by performing URL inspection of web traffic.
We leave some standard blocking category settings in place. These are as in the list below. We can leave these in place or remove them.
Standard Blocking Category List:
If you want to get more restrictive we can add more categories from the following list. You may want to consider time-wasting things such as social networking for example, or bandwidth wasting things such as P2P/File Sharing, File Sharing or Radio etc.
Full Category List:
|Academic Fraud||Adult Themes||Adware||Alcohol|
|Drugs||Ecommerce/Shopping||Educational Institutions||File Storage|
|Financial Institutions||Forums/Message boards||Gambling||Games|
|German Youth Protection||Government||Hate/Discrimination||Health and Fitness|
|Nudity||P2P/File sharing||Parked Domains||Photo Sharing|
|Search Engines||Sexuality||Social Networking||Software/Technology|
|Travel||Typo Squatting||Video Sharing||Visual Search Engines|
Cloud-Delivered Network Security
Umbrella’s enterprise threat protection is powered by predictive Security Graph intelligence.
Umbrella reduces the risk and impact of security breaches by blocking malicious Internet connections. Unlike antivirus or sandboxes, we block known and unknown threats by malicious domains, URLs or IPs. And unlike pure proxies, we contain botnet callbacks from infected devices over any port, protocol or app.
- Stay Ahead of Attacks
OpenDNS predicts attacks before they begin or cause damage. Security Graph combines our unique visibility of over 2% of the world’s Internet requests with big data analytics to see attacks as they’re being set up.
- No Latency or Complexity
Proxying every Web connection slows traffic, invades privacy, and can break sites. Based on intelligence, OpenDNS routes and proxies only connections that require deeper inspection below the domain-level.
- Prevent Malware Infections
Umbrella predictively blocks connections to malicious infrastructures, greatly reducing the risk of infections or the need for time-consuming cleanup.
- Contain Botnet Callbacks
Umbrella uniquely stops malware-infected devices from phoning home for new updates or to exfiltrate data. Since malware relies on domains as rendezvous points to connect to their botnet controllers, Umbrella is in a unique position to block that connection over any port or protocol.
- Block Phishing Sites
Don’t rely on your users to spot a phish. Umbrella protects against fraudulent Websites that attempt to steal their login credentials–often the same as those used to access corporate networks and cloud apps.