ITB - IT Solutions for the next generation
linkedin logo twitter logo facebook logo google+ logo

iSheriff Product Review – SC Magazine

10th August 2015

Our trusted partner, iSheriff, have been put to the test with a product review by SC Magazine.

In short, iSheriff, offer an integrated security management tool deployed in the cloud covering Email, Web and Endpoint.

ITB Selected iSheriff not only for the simple and comprehensive solution they provide but because they thrive to consistently improve their offering with the customer in mind.

The SC Magazine write up:

Today we have virtual systems, cloud computing, some discrete hardware and virtually no solid perimeter. How do you secure that? iSheriff has the answer.
iSheriff is one of a flock of vendors that are trying to use the cloud to protect the data center back down on Earth. And it is doing an admirable
job of it. The company does it from the cloud as many similar vendors do but there are some differences – and we liked them a lot. But, before we get
to the differences, a bit about the product.

The tool is deployed in the cloud. It offers anti-malware, content filtering, data leak prevention, application control, anti-spam and phishing and message
archiving. It is based in 35 data centers around the world and it sits on a private backbone network, not the internet. You can create policies around
data sources, devices and users. The client is lightweight when deployed, but if a particular service is needed, it can be added directly from the

The policy engine is straightforward. Policies are easy to deploy and web filters are equally simple. Like most similar products, iSheriff has drill down.
However, this drill down seems to go on forever. The amount of data that you can get as you analyze is amazing. One excellent application for the drill
down is forensic analysis. There is enough information to conduct a full investigation and provide the entire audit trail needed to make your case.

There are a variety of dashboards available. Within the general functions – email, web, malware – there are individual dashboards that supply the big picture.
For example, for the web security functionality there are dashboards for an overview (blocked viruses and spyware, malicious sites blocked and policies
triggered), web traffic overview, application overview, social media overview, data leakage overview, as well as web tools. All of these, of course,
have multiple layers of drill down to analyze top-level reporting.

Read the full article here