vAC-image-Singapore

Sangfor IAG secures office networks through user authentication, endpoint control, behavior monitoring, and audit to reduce risks.

Explore
Product Description

Highlights
Secure Web Gateway replacement with Zero Trust–based protection for users and data.

Detail

Applicable IAG Use Cases

  1. Internet Access Control: User authentication, traffic management, application blocking, and behavior auditing.

  2. Terminal Access Control: Network access authentication, security compliance checks, and endpoint control.

  3. Data Leakage Prevention: Outbound traffic control, auditing, and leakage analysis.

  4. Multi-Branch Unified Management: Centralized control, unified authentication, branch behavior auditing, and consolidated log collection and analysis.

Core IAG Capabilities

  1. Internet Behavior Management

  • Identity Authentication: Supports more than 30 authentication methods and integrates with multiple authentication systems, delivering a smooth experience for employees, guests, and unmanaged devices while enabling rapid real-name identification.

  • Application Control: Provides granular control over web and SSL applications, shared internet access, and file transfers.

  • Bandwidth Management: Visualizes network traffic to clearly present real-time network performance.

  • Behavior Auditing: Supports web and client application log auditing and report analysis, while balancing privacy through an “audit-free key” mechanism.

  • Internet Proxy: Supports HTTP, SOCKS, and ICAP protocols.

  • Security Protection: Built-in enterprise firewall and antivirus engine protect endpoints, with web access quality detection and mobile device access control.

  1. Terminal Access Security

  • Asset Discovery: Provides visibility into enterprise intranet topology, endpoint deployment, and usage.

  • Access Authentication: Offers multiple authentication options to meet varying security levels and access control granularity.

  • Security Baseline Checks: Enforces compliance assessments to enhance overall intranet reliability and availability.

  1. Lightweight Endpoint Desktop Management

  • Illegal Outbound Control: Strengthens control of unauthorized outbound connections through detection and enforcement.

  • Peripheral Management: Controls use of storage devices, network interfaces, Bluetooth, cameras, printers, and more.

  • Offline Auditing: Maintains audit capabilities even when endpoints are temporarily disconnected.

  • Desktop Watermarking: Adds on-screen watermarks to improve sensitive data management.

  • Port Control: Manages endpoint ports to mitigate high-risk Windows vulnerabilities.

  • Application Network Control: Restricts application network access rights to enhance security and privacy.

  1. Endpoint Data Leak Prevention

  • Leakage Auditing: Audits file outbound activities across multiple channels, including applications, peripherals, and decryption actions, while retaining files for forensic analysis.

  • Leakage Prevention: Intercepts and blocks unauthorized file transfers to prevent sensitive data exposure.

  1. Business Behavior Auditing

  • Business Audits: Helps enterprises document business systems, track access activities, manage account security, and audit both business access behavior and server outbound activities, including packet content recording.

Tell Us About Your Needs