Secured browsing
MedOne offers Browsing-as-a-Service. This solution provides the organization with virtual browsing capabilities on MedOne’s cloud services and is part of a variety of computing solutions for businesses offered by MedOne.
The unique computing solution includes intelligence for diagnosing and routing the relevant browsing in automatic and user-transparent fashion to the virtual environment, with a granular rule engine personalized to the company’s policy, an identity management system and providing performance on a dedicated protocol; all fully personalized and with content blackout and transferred content whiteout capabilities.
The system has complete command capabilities over monitoring and managing the browsing, including URL filtering, UP repetition, management of all the rights and control of all the browsing solution. Browsing is provided by virtual IE or Chrome browsers on MedOne’s cloud infrastructures. The system is priced according to actual browsing hours.
Which organizations is this service intended for?
The product is a unique product which uses technologies by the leading manufacturer and has a consolidated management console and a uniform system developed for this purpose. MedOne’s cloud’s is in two optimally secured and protected underground facilities and is the only one in Israel compliant with the world’s strictest information security standards.
The system’s strategic location offers browsing at an especially high speed and provides a practical solution even in the exceptional situation of a collapse of external national infrastructures. For organizations which have a large database and sensitive technological information, a Browsing-as-a-Service solution is considered a must nowadays, and it is highly recommended to receive it at the highest, most reliable and efficient level.
Secured Browsing’s unique capabilities:
A granular rule engine, as an integral part of the comprehensive solution. Applies the client’s policy in the most thorough manner, enabling the definition of complex rules using simple means.
Dedicated for the content scanning engines .The system can white out materials according to a selected policy toward groups of users and can send the materials to the destination automatically toward the relevant entity on API, with no involvement on the part of the user.
Optimal handling of the threats, while fully monitoring, controlling the types of files, and optional integration with supplementary information security technologies to create a more practical and comprehensive solution.
The system’s capabilities include generic antivirus scans, ID, metadata cleaning, file recreation, identification and reliability check of each file type and its content.
We are the only cloud in Israel compliant with the CSA Star, ISO27001, ISO27017, ISO27799 information security standards.
The system’s capabilities include generic antivirus scans, ID, metadata cleaning, file recreation, identification and reliability check of each file type and its content.
Full portal for self-use by the client, using a human admin. This allows the client full independence and prevents information security issues. There is a capability of using general filtering or installing a dedicated filtering mechanism, monitoring files and information. Optional blocking of sensitive contents or part of it.
The payment for an end-to-end solution, including all its components, is according to actual browsing hours, as befits a public cloud. An automated billing system measuring the use of the resources. The resource allocation itself is adjustable and can be timed according to days per week and hours per day, with the intent of achieving maximum efficiency and receiving a highly cost-effective and expedient product.
To create a separate and secure environment for the client, you can be connected via a direct infrastructure line between your facilities and MedOne’s cloud service.
Since MedOne’s cloud is installed at Israel’s information juncture, we are connected to all the country’s infrastructure providers and to international infrastructures as well. Additionally, we provide a browsing speed of at least 1Gb/Sec.
Browsing-as-a-Service is provided on a cloud infrastructure featuring full encryption, rule definition, ability to create blacklists and whitelists, separation between clients, identification, and protection systems. Additionally, every login to the system requires two-factor authentication, thereby preventing employees from accessing problematic websites or pages containing malware.
The browsing services includes URL filtering, allowing the client to control access to sites according to groups and profiles.
Browsing-as-a-Service is provided on cloud infrastructure offering full encryption, rule definition, ability to create blacklists and whitelists, separation between clients, identification, and protection systems. Additionally, every login to the system requires two-factor authentication, thereby preventing employees from accessing problematic websites or pages containing malware.