iSheriff, a cloud security company headquartered in Redwood City, California, has announced the release of its iSheriff Complete – a comprehensive cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels.
This new cloud security platform, iSheriff Complete, provides fully integrated endpoint, web and email security, delivered through a single web-based management console with a single set of enforceable security policies. As a cloud-based security platform, iSheriff would remove potential malware and viruses before they ever reach the network by providing a ‘clean feed’ to customers for their email and Web traffic.
“In order to provide a secure network, a security manager must be able to see and control all communications in and out of that network,” said John Mutch, CEO of iSheriff. “iSheriff Complete provides superior malware protection and full control of web, email and endpoint vectors, providing the only integrated cloud-based security platform available today. We deliver complete cyber security through the cloud, all controlled by a single, easy-to-use interface. iSheriff Complete implements security policies and schedules reports in minutes, so our customers can get back to running their businesses.”
Available now, the new cloud security platform includes:
- Endpoint, Web & Email – Complete vector control and visibility is central to the iSheriff platform, which would offer a tightly integrated security solution. iSheriff Complete is designed to enforce common security policies across all vectors, as well as track users both on and off the network.
- Threat Detection Engine – Working 24x7x365 to stay ahead of the latest cyber threats on a worldwide basis, iSheriff security operates around the globe. It would detect new threats and develop and propagate new signatures in a matter of seconds.
- Active Response Console – The console is designed to be easy-to-use, allowing organizations to control their entire cyber security system from one interface. Threats are displayed instantly, along with what actions have to be taken based on defined policies.
“We’re in an age of fast-moving change and innovation powered by connected mobile devices and cloud computing, which has opened up the influence of technology to everyone, including criminals,” added Mr. Mutch. “Cloud-based services and software of all varieties have been broadly adopted. By eliminating the need for complex and expensive hardware and software installation and offering scalable, per user pricing, cloud-based platforms open access to services that were previously cost-prohibitive for many businesses.”