vAC-image-Singapore
Sangfor IAG secures office networks through user authentication, endpoint control, behavior monitoring, and audit to reduce risks.
ExploreProduct Description
Highlights
Secure Web Gateway replacement with Zero Trust–based protection for users and data.
Detail
Applicable IAG Use Cases
Internet Access Control: User authentication, traffic management, application blocking, and behavior auditing.
Terminal Access Control: Network access authentication, security compliance checks, and endpoint control.
Data Leakage Prevention: Outbound traffic control, auditing, and leakage analysis.
Multi-Branch Unified Management: Centralized control, unified authentication, branch behavior auditing, and consolidated log collection and analysis.
Core IAG Capabilities
Internet Behavior Management
Identity Authentication: Supports more than 30 authentication methods and integrates with multiple authentication systems, delivering a smooth experience for employees, guests, and unmanaged devices while enabling rapid real-name identification.
Application Control: Provides granular control over web and SSL applications, shared internet access, and file transfers.
Bandwidth Management: Visualizes network traffic to clearly present real-time network performance.
Behavior Auditing: Supports web and client application log auditing and report analysis, while balancing privacy through an “audit-free key” mechanism.
Internet Proxy: Supports HTTP, SOCKS, and ICAP protocols.
Security Protection: Built-in enterprise firewall and antivirus engine protect endpoints, with web access quality detection and mobile device access control.
Terminal Access Security
Asset Discovery: Provides visibility into enterprise intranet topology, endpoint deployment, and usage.
Access Authentication: Offers multiple authentication options to meet varying security levels and access control granularity.
Security Baseline Checks: Enforces compliance assessments to enhance overall intranet reliability and availability.
Lightweight Endpoint Desktop Management
Illegal Outbound Control: Strengthens control of unauthorized outbound connections through detection and enforcement.
Peripheral Management: Controls use of storage devices, network interfaces, Bluetooth, cameras, printers, and more.
Offline Auditing: Maintains audit capabilities even when endpoints are temporarily disconnected.
Desktop Watermarking: Adds on-screen watermarks to improve sensitive data management.
Port Control: Manages endpoint ports to mitigate high-risk Windows vulnerabilities.
Application Network Control: Restricts application network access rights to enhance security and privacy.
Endpoint Data Leak Prevention
Leakage Auditing: Audits file outbound activities across multiple channels, including applications, peripherals, and decryption actions, while retaining files for forensic analysis.
Leakage Prevention: Intercepts and blocks unauthorized file transfers to prevent sensitive data exposure.
Business Behavior Auditing
Business Audits: Helps enterprises document business systems, track access activities, manage account security, and audit both business access behavior and server outbound activities, including packet content recording.