iShield Home

Is your at-home workforce secure and productive?

As companies realise that work-from-home environments will be around for the foreseeable future, they need to ensure that their employees can securely and productively perform their duties from home.

iShield Home is a next-generation firewall that does deep-packet inspection including application level inspection and intrusion prevention/detection by utilising intelligence from outside of the firewall. The firewall is also referred to as a smart access Unified Threat Management (UTM) device that is located at your staff’s home, giving you the ability to remotely control your entire network via the Cloud.

Bandwidth is now a major resource for employees working from home. Companies face the challenge of determining whether employees are using the internet for personal interactions. iShield Home is ideally placed to guard against your employees draining bandwidth for personal reasons while they should be working.

iShield Home

iShield Home is the ideal solution for simple and comprehensive internet management:

  • Network Protection

    Redundancy, VPN, Reporting All in one Unified Threat Management Tool

  • Affordability

    Local currency pricing makes Cloud Group’s solution significantly more cost effective than international solutions

  • Increase Employee Productivity

    Block or restrict users from unproductive time online

  • Reduce Internet Costs

    Daily, weekly or monthly usage limits ensure your network is never compromised by excessive bandwidth consumption

  • HTTPS Interception

    iShield Home is built to detect the usually unmonitored HTTPS protocol ensuring all traffic is reported

  • Google Security

    Hosted on Google’s secure Cloud Platform, ensuring best-in-class protection with anytime, anywhere availability of company data

The Key Features of the iShield Include:

Web (HTTP/HTTPS)

iShield NG5 is built to detect the usually unmonitored HTTPS protocol ensuring all traffic is reported.

HTTPS exclusion list for specific transactions.

HTTPS “Peek” mode - No longer requiring the need for certificates to be installed on end devices.

HTTP anti-virus scanning and attack prevention

Cloud-Stored Usage Reports

All usage statistics are stored in Google’s secure advanced cloud infrastructure to prevent any possible data loss

Usage statistics are retained on local storage in the event of Internet connectivity loss

All Summary Header Records are retained

Firewall Security

Built-in firewall proxy scans all web traffic for potential phishing sites

In-line Unified Management Threat device

Additional perimeter protection

Customisable firewall rules supported for blocking, diverting, natting and permitting connections.

Hammer protection - Preventing brute-force logins on internally exposed systems on a connection level.

Deep Packet Inspection (DPI)

Per Protocol identification of all internet traffic.

Detailed report on which protocols are being used by what user

Phishing Attack Prevention

Users cannot bypass suspected malware or phishing websites’ browser warnings.

Multi-Link Capability (Auto Failovers)

Manage multiple Internet connections

Failover provides peace of mind should your Internet connection fail