CYREN, Recurrent Pattern Detection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN.
U.S. Patent No. 6,330,590 is owned by CYREN.
SHOLOVE WebSecurity
PROTECT YOUR CRITICAL INFORMATION  ON ANY DEVICE  ANYWHERE
SHOLOVE WebSecurity delivers industry-leading, cloud-
based security that protects your employees, enables
compliance and lowers your total cost of security. Using a
proven Security-as-a-Service (SaaS) deployment model,
SHOLOVE WebSecurity is easy to set-up and administer,
enabling you to support a mobile workforce and operate
your own “bring-your-own-device” (BYOD) policy.
Benefits of SHOLOVE WebSecurity
Advanced Protection
 Antivirus—Reduce risk of malware infections or the
need for time-consuming cleanup. SLI WebSecurity is your
defense between the end user and the Internet, giving
immediate protection from viruses and spyware, across all
locations.
 URL Protection—Block connections to phishing and
other malicious sites to prevent infection and
credential/login compromises. The system uses the most
up-to-date data on phishing, advanced persistent threat,
and other unsafe sites, and immediately blocks requests
to them. Users are redirected to a customized warning
page.
 Always Up to Date—Ensure your security is always the latest and greatest.
SHOLOVE WebSecurity checks all Web traffic against up-to-the-second threat
profiles produced by our global threat analysis platform, giving you instant
protection from new and zero-hour threats as they emerge without the need for
complex, time-consuming software updates.
Extend Your Security to Mobile Users
 Mobile Device Coverage—Extend your security coverage to smartphones and
tablets – even BYOD ones. Regardless of location or device ownership, Androids,
and iOS users are protected from Web malware, phishing, and botnet attacks,
while conforming to your company browsing policy. With processing performed
in the cloud, there is no impact on device performance or battery life.
• Powered by the GlobalView™ Cloud the largest threat
analysis platform in the world.
• Industry-leading Web filtering, antivirus, and malware
detection from a provider protecting 550 million users
across the globe.
• Helps detect advanced persistent threats by blocking
their communications.
• Covers all your devices the system cover desktops,
laptops, smartphones and tablets, even BYOD ones.
• Security on demand from a global platform operating for
over 15 years.
• 3-click deployment the system is designed to be up and
running fast, so users can be protected in minutes.
• Low/no overhead designed for SMBs, the system needs
no hardware and is easy to manage.
• Detailed insight comprehensive reporting provides
insight into every aspect of your company’s Web use.
Fighttoday’sInternetthreatswithtoday’stechnology.Protectusers-
on all devices, at any location - with consistent policies. Centralized
deployment,monitoring,andreportingsimplifymanagement.
SHOLOVE WebSecurity at a Glance
CYREN, Recurrent Pattern Detection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN.
U.S. Patent No. 6,330,590 is owned by CYREN.
SHOLOVE WebSecurity
Great User Experience
 Local Access and Low Latency— The SHOLOVE WebSecurity global platform delivers local access with low
latency for a consistently great browsing experience, regardless of device or user location. With multiple global
points of presence, the system is so fast your users won’t even know it’s there.
Simple Management
 Intuitive Interface—Deployment and configuration are easy with our intuitive interface. With SHOLOVE
WebSecurity, you can create policies specific to your needs and corporate structure in just a few minutes. Our
advanced dashboard gives you instant insight into all current threats detected and traffic usage, while our
flexible reporting delivers the detailed understanding of how your users truly use the Web.
How It Works
The foundation of SHOLOVE WebSecurity is the CYREN GlobalView™ Cloud infrastructure, the largest security
network of its kind in the world. The GlobalView™ Cloud processes over 13 Billion transactions every day and
protects 550 million users in 190 countries from Internet threats. With local, regional, and continental
redundancy, GlobalView™ Cloud provides multiple global points-of-presence, ensuring near-zero latency and
local data handling where required by country-specific privacy legislation.
CYREN, Recurrent Pattern Detection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN.
U.S. Patent No. 6,330,590 is owned by CYREN.
SHOLOVE WebSecurity
End-users are routed to the GlobalView™ Cloud via a variety of options: Organizational traffic is directed using
proxy-chaining, port-forwarding, or GRE tunneling or, for roaming users Proxy Auto Config (PAC) files may be
used in deployment. Smartphones and tablets are supported by a range of configuration solutions for the
Android and iOS operating systems, with mobile users routed through the closest secure VPN tunnel.
Top Reasons Why YOU Need A Layered Security Option
There's a Hardware Element
Although much of the talk of mobile security centers on software, it's important to point out that smartphones and tablets are, well,
mobile. That means that they can be easily stolen or used in malicious ways when outside the view of the IT staff. Hardware security
is a huge issue in today's mobile-security landscape.
Apps Aren't Secure
Here's a staggering statistic: 92 percent of the top 500 Android apps carry either a security or privacy risk, according to recent data
from security firm MetaIntell. But it's not just Android. As noted, Snapchat, among several other apps, suffers from its own security
issues on iOS. At this point, it appears apps—regardless of platform—aren't nearly as secure as one would hope.
Follow the Hackers
Last year, in its annual security report, Sophos revealed that Android, not Windows, is the world's most targeted platform among
hackers. That report came after it was revealed that an increasing number of hackers were intentionally targeting iOS far more than
all other mobile operating systems, save for Android. If the hackers are moving to mobile, both Android and iOS users should be
scared—very scared.
For the Enterprise: Data Theft
Data theft is a major concern for the enterprise. But the concern isn't necessarily about hackers; it's about employees. Fiberlink, an
IBM-owned company, recently told Tech Republic that the enterprise's list of most-blacklisted apps was dominated by cloud-storage
solutions like DropBox, Box and Google Drive. For the enterprise, one of the biggest threats is watching employees walk out of the
office with the ability to take any sensitive data they want and put it on cloud storage.
Jailbreaking Is a Wild World
Although Jailbreaking devices allows for access to more applications, it also opens a potential world of hurt for mobile users. In fact,
the majority of security issues that affect Apple's iOS can only harm those products that are jailbroken and not locked down.
Jailbreaking allows users to run unverified apps on devices. Sometimes, that's a good thing, but in many cases, it's a bad thing.
For the Enterprise: Biometric Security
There's another problem facing the corporate world that doesn't necessarily get the play it deserves: biometrics. While in the
consumer market, biometric security, like a fingerprint scanner or the much-ballyhooed eye scanner, will help secure devices, for the
IT side, it could be a nightmare. BYOD is taking the corporate world by storm. If employees are using their personal devices in the
office and they're securing those products with their fingerprints or, eventually, eye scanners, IT staff will have serious trouble gaining
access to those devices and ensuring device security.
Malware Is on the Rise
Mobile malware is expected to continue its upward trend over the next several years. Last month, McAfee reported that mobile
malware was up 33 percent in 2013 compared with 2012. The company also said that it anticipates mobile malware to increase even
more in 2014. At this point, it appears mobile malware is not going to slow down anytime soon.
It's an E-Commerce World
As last year's Target data breach showed, malicious hackers are still more than happy to target credit cards. Historically, that has
meant either targeting retailers or finding ways to steal credit card information on the PC. But now that mobile e-commerce is
booming, malicious hackers are finding tricks to steal credit card information on smartphones and tablets. The e-commerce struggle
continues on mobile.
Is the Government Watching?
It would be remiss to not include some mention of alleged government surveillance as part of any discussion on mobile security. In
2013, all eyes were on the National Security Agency and other federal government agencies that have allegedly been spying on
smartphones and tablets through the years. In January, a report suggested that third-party mobile advertising networks are allowing
the NSA to access user data in applications and get a full dossier on individuals. Who knew the government knew so much?
SHOLOVE INTERNATIONAL LLC. PO Box 12304 Scottsdale AZ 85267. www.sholove.org 480.553.9709 866.357.8417 info@sholove.com

Sholove cyren web security - technical datasheet2

  • 1.
    CYREN, Recurrent PatternDetection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN. U.S. Patent No. 6,330,590 is owned by CYREN. SHOLOVE WebSecurity PROTECT YOUR CRITICAL INFORMATION ON ANY DEVICE ANYWHERE SHOLOVE WebSecurity delivers industry-leading, cloud- based security that protects your employees, enables compliance and lowers your total cost of security. Using a proven Security-as-a-Service (SaaS) deployment model, SHOLOVE WebSecurity is easy to set-up and administer, enabling you to support a mobile workforce and operate your own “bring-your-own-device” (BYOD) policy. Benefits of SHOLOVE WebSecurity Advanced Protection Antivirus—Reduce risk of malware infections or the need for time-consuming cleanup. SLI WebSecurity is your defense between the end user and the Internet, giving immediate protection from viruses and spyware, across all locations. URL Protection—Block connections to phishing and other malicious sites to prevent infection and credential/login compromises. The system uses the most up-to-date data on phishing, advanced persistent threat, and other unsafe sites, and immediately blocks requests to them. Users are redirected to a customized warning page. Always Up to Date—Ensure your security is always the latest and greatest. SHOLOVE WebSecurity checks all Web traffic against up-to-the-second threat profiles produced by our global threat analysis platform, giving you instant protection from new and zero-hour threats as they emerge without the need for complex, time-consuming software updates. Extend Your Security to Mobile Users Mobile Device Coverage—Extend your security coverage to smartphones and tablets – even BYOD ones. Regardless of location or device ownership, Androids, and iOS users are protected from Web malware, phishing, and botnet attacks, while conforming to your company browsing policy. With processing performed in the cloud, there is no impact on device performance or battery life. • Powered by the GlobalView™ Cloud the largest threat analysis platform in the world. • Industry-leading Web filtering, antivirus, and malware detection from a provider protecting 550 million users across the globe. • Helps detect advanced persistent threats by blocking their communications. • Covers all your devices the system cover desktops, laptops, smartphones and tablets, even BYOD ones. • Security on demand from a global platform operating for over 15 years. • 3-click deployment the system is designed to be up and running fast, so users can be protected in minutes. • Low/no overhead designed for SMBs, the system needs no hardware and is easy to manage. • Detailed insight comprehensive reporting provides insight into every aspect of your company’s Web use. Fighttoday’sInternetthreatswithtoday’stechnology.Protectusers- on all devices, at any location - with consistent policies. Centralized deployment,monitoring,andreportingsimplifymanagement. SHOLOVE WebSecurity at a Glance
  • 2.
    CYREN, Recurrent PatternDetection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN. U.S. Patent No. 6,330,590 is owned by CYREN. SHOLOVE WebSecurity Great User Experience Local Access and Low Latency— The SHOLOVE WebSecurity global platform delivers local access with low latency for a consistently great browsing experience, regardless of device or user location. With multiple global points of presence, the system is so fast your users won’t even know it’s there. Simple Management Intuitive Interface—Deployment and configuration are easy with our intuitive interface. With SHOLOVE WebSecurity, you can create policies specific to your needs and corporate structure in just a few minutes. Our advanced dashboard gives you instant insight into all current threats detected and traffic usage, while our flexible reporting delivers the detailed understanding of how your users truly use the Web. How It Works The foundation of SHOLOVE WebSecurity is the CYREN GlobalView™ Cloud infrastructure, the largest security network of its kind in the world. The GlobalView™ Cloud processes over 13 Billion transactions every day and protects 550 million users in 190 countries from Internet threats. With local, regional, and continental redundancy, GlobalView™ Cloud provides multiple global points-of-presence, ensuring near-zero latency and local data handling where required by country-specific privacy legislation.
  • 3.
    CYREN, Recurrent PatternDetection, RPD, and GlobalView are trademarks, and CYREN, Eleven, Authentium, F-Prot, Command Antivirus, and Command Anti-malware are registered trademarks, of CYREN. U.S. Patent No. 6,330,590 is owned by CYREN. SHOLOVE WebSecurity End-users are routed to the GlobalView™ Cloud via a variety of options: Organizational traffic is directed using proxy-chaining, port-forwarding, or GRE tunneling or, for roaming users Proxy Auto Config (PAC) files may be used in deployment. Smartphones and tablets are supported by a range of configuration solutions for the Android and iOS operating systems, with mobile users routed through the closest secure VPN tunnel. Top Reasons Why YOU Need A Layered Security Option There's a Hardware Element Although much of the talk of mobile security centers on software, it's important to point out that smartphones and tablets are, well, mobile. That means that they can be easily stolen or used in malicious ways when outside the view of the IT staff. Hardware security is a huge issue in today's mobile-security landscape. Apps Aren't Secure Here's a staggering statistic: 92 percent of the top 500 Android apps carry either a security or privacy risk, according to recent data from security firm MetaIntell. But it's not just Android. As noted, Snapchat, among several other apps, suffers from its own security issues on iOS. At this point, it appears apps—regardless of platform—aren't nearly as secure as one would hope. Follow the Hackers Last year, in its annual security report, Sophos revealed that Android, not Windows, is the world's most targeted platform among hackers. That report came after it was revealed that an increasing number of hackers were intentionally targeting iOS far more than all other mobile operating systems, save for Android. If the hackers are moving to mobile, both Android and iOS users should be scared—very scared. For the Enterprise: Data Theft Data theft is a major concern for the enterprise. But the concern isn't necessarily about hackers; it's about employees. Fiberlink, an IBM-owned company, recently told Tech Republic that the enterprise's list of most-blacklisted apps was dominated by cloud-storage solutions like DropBox, Box and Google Drive. For the enterprise, one of the biggest threats is watching employees walk out of the office with the ability to take any sensitive data they want and put it on cloud storage. Jailbreaking Is a Wild World Although Jailbreaking devices allows for access to more applications, it also opens a potential world of hurt for mobile users. In fact, the majority of security issues that affect Apple's iOS can only harm those products that are jailbroken and not locked down. Jailbreaking allows users to run unverified apps on devices. Sometimes, that's a good thing, but in many cases, it's a bad thing. For the Enterprise: Biometric Security There's another problem facing the corporate world that doesn't necessarily get the play it deserves: biometrics. While in the consumer market, biometric security, like a fingerprint scanner or the much-ballyhooed eye scanner, will help secure devices, for the IT side, it could be a nightmare. BYOD is taking the corporate world by storm. If employees are using their personal devices in the office and they're securing those products with their fingerprints or, eventually, eye scanners, IT staff will have serious trouble gaining access to those devices and ensuring device security. Malware Is on the Rise Mobile malware is expected to continue its upward trend over the next several years. Last month, McAfee reported that mobile malware was up 33 percent in 2013 compared with 2012. The company also said that it anticipates mobile malware to increase even more in 2014. At this point, it appears mobile malware is not going to slow down anytime soon. It's an E-Commerce World As last year's Target data breach showed, malicious hackers are still more than happy to target credit cards. Historically, that has meant either targeting retailers or finding ways to steal credit card information on the PC. But now that mobile e-commerce is booming, malicious hackers are finding tricks to steal credit card information on smartphones and tablets. The e-commerce struggle continues on mobile. Is the Government Watching? It would be remiss to not include some mention of alleged government surveillance as part of any discussion on mobile security. In 2013, all eyes were on the National Security Agency and other federal government agencies that have allegedly been spying on smartphones and tablets through the years. In January, a report suggested that third-party mobile advertising networks are allowing the NSA to access user data in applications and get a full dossier on individuals. Who knew the government knew so much? SHOLOVE INTERNATIONAL LLC. PO Box 12304 Scottsdale AZ 85267. www.sholove.org 480.553.9709 866.357.8417 info@sholove.com