SlideShare a Scribd company logo
1 of 2
Download to read offline
Intelligent Internet Management


The Internet is an essential part of business communications, but
if not carefully managed, threatens employee productivity, data
integrity   and    company     profitability. Internet   traffic   from
non-business related websites can greatly impact an enterprise’s
productivity, while service-affecting attacks from malicious code
jeopardize security and can shut down a corporate network.
Deploying     and    managing     premise-based     firewalls    create
significant cost for IT departments, which can no longer isolate the
business from the outside world to protect the corporate network.


Our Intelligent Internet Management (IIM) suite of network-embedded services enables
managed Internet browsing while simplifying network security. This cloud-based service
offers a range of Internet management services, from basic firewall functions to web-content
filtering and individual application control. There are no premise-based appliances; you can simply
manage your entire corporate network using a single set of policies. The service is always
available and ready for rapid activation once your policies are detailed and selected. Used in
conjunction with Masergy’s Intelligent Transport service, IIM makes securing your network easy
and cost effective, while providing your business with an integrated threat management solution.


Key Features

• Granular filtering and application control
• Maintained in Masergy’s POPs
• Easy to add sites or upgrade bandwidth
• Provides a clean pipe for all network traffic
• Detailed reporting
• Continuous database updates


Key Benefits
                                                            Masergy’s Intelligent Internet Management service offers
                                                            Application Control, Web Content Filtering, and Network
• Worry free service                                        Based Firewall

• Eliminates equipment costs
• Reduces support costs
• Global availability for all services
• Ensures bandwidth optimization
www.masergy.com
Intelligent Internet Management


               Application Control
               Recognizes specific application “signatures” and applies pre-set policies.
               • Set policies for individual applications such as YouTube and Facebook
               • Block specific web applications
               • Limit bandwidth available to specific applications
               •	 Limit certain features of individual applications




               Web Content Filtering
               Allows filtering of web traffic by pre-defined categories for broad policy management.
               • Control web traffic by categories such as pornography, sports and games
               • Lower Internet access costs and maximize bandwidth usage
               • Prevent access to objectionable and non-productive websites
               • Improve employee productivity
               • Provide a safe and healthy work environment for employees




               Network-Based Firewall
               Full firewall capabilities integrated into your wide-area network service.
               • Network embedded appliances installed in strategic Masergy hubs monitor and
                 inspect all traffic into and out of your network
               • Allows or denies traffic from one network to another based on customer
                 provided policies and rules
               • Specifically designed and deployed by Masergy NOC Engineers to allow only
                 valid traffic based on customer requirements
               • Powered by best in class technology delivering the strongest available
                 firewall solution




                                                                                 www.masergy.com

More Related Content

What's hot

Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsBelsoft
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Secure internet a6
Secure internet a6Secure internet a6
Secure internet a6niallmmackey
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Carolynrahn
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Improvement WiFi Security Network Access
Improvement WiFi Security Network AccessImprovement WiFi Security Network Access
Improvement WiFi Security Network AccessAhmad Firdaus
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPROIDEA
 

What's hot (20)

Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation Firewalls
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Secure internet a6
Secure internet a6Secure internet a6
Secure internet a6
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Improvement WiFi Security Network Access
Improvement WiFi Security Network AccessImprovement WiFi Security Network Access
Improvement WiFi Security Network Access
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 
Retail
RetailRetail
Retail
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 

Similar to Intelligent Internet Managed

Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesBilly jones Monarquia
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!Tonya Williams
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationMatsuo Sawahashi
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaidrackAID Support
 
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Akamai Technologies
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheetcathylums
 

Similar to Intelligent Internet Managed (20)

Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
Find the key features of an advanced firewall
Find the key features of an advanced firewallFind the key features of an advanced firewall
Find the key features of an advanced firewall
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
Network and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle TransformationNetwork and Security Reference Architecture For Driving Workstyle Transformation
Network and Security Reference Architecture For Driving Workstyle Transformation
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaid
 
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Segmentation on azure platform
Segmentation on azure platformSegmentation on azure platform
Segmentation on azure platform
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
 
Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014
 
IBM Application Acceleration Data Sheet
IBM Application Acceleration Data SheetIBM Application Acceleration Data Sheet
IBM Application Acceleration Data Sheet
 

Intelligent Internet Managed

  • 1. Intelligent Internet Management The Internet is an essential part of business communications, but if not carefully managed, threatens employee productivity, data integrity and company profitability. Internet traffic from non-business related websites can greatly impact an enterprise’s productivity, while service-affecting attacks from malicious code jeopardize security and can shut down a corporate network. Deploying and managing premise-based firewalls create significant cost for IT departments, which can no longer isolate the business from the outside world to protect the corporate network. Our Intelligent Internet Management (IIM) suite of network-embedded services enables managed Internet browsing while simplifying network security. This cloud-based service offers a range of Internet management services, from basic firewall functions to web-content filtering and individual application control. There are no premise-based appliances; you can simply manage your entire corporate network using a single set of policies. The service is always available and ready for rapid activation once your policies are detailed and selected. Used in conjunction with Masergy’s Intelligent Transport service, IIM makes securing your network easy and cost effective, while providing your business with an integrated threat management solution. Key Features • Granular filtering and application control • Maintained in Masergy’s POPs • Easy to add sites or upgrade bandwidth • Provides a clean pipe for all network traffic • Detailed reporting • Continuous database updates Key Benefits Masergy’s Intelligent Internet Management service offers Application Control, Web Content Filtering, and Network • Worry free service Based Firewall • Eliminates equipment costs • Reduces support costs • Global availability for all services • Ensures bandwidth optimization www.masergy.com
  • 2. Intelligent Internet Management Application Control Recognizes specific application “signatures” and applies pre-set policies. • Set policies for individual applications such as YouTube and Facebook • Block specific web applications • Limit bandwidth available to specific applications • Limit certain features of individual applications Web Content Filtering Allows filtering of web traffic by pre-defined categories for broad policy management. • Control web traffic by categories such as pornography, sports and games • Lower Internet access costs and maximize bandwidth usage • Prevent access to objectionable and non-productive websites • Improve employee productivity • Provide a safe and healthy work environment for employees Network-Based Firewall Full firewall capabilities integrated into your wide-area network service. • Network embedded appliances installed in strategic Masergy hubs monitor and inspect all traffic into and out of your network • Allows or denies traffic from one network to another based on customer provided policies and rules • Specifically designed and deployed by Masergy NOC Engineers to allow only valid traffic based on customer requirements • Powered by best in class technology delivering the strongest available firewall solution www.masergy.com