Ericom Shield

Ericom Shield

Ericom Software
Phantom

Phantom

Intelligent Waves
+
+

Related Products

  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,061 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Hotspot Shield
    121 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website

About

Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints.

About

The Phantom Next Generation, award-winning solution provides the ability for organizations to access foreign points of presence to conduct remote open-source information gathering and research while at the same time protecting organizations and individuals from exposure to foreign intelligence. Intelligent Waves has achieved this by combining the GRAYPATH software-defined obfuscated network with the managed attribution capability of the Phantom platform in a secure but unclassified package. The system uses all the capability of the GRAYPATH network to provide low probability of detection, intercept, and exploitation of application traffic and obfuscate the user’s location while the Phantom platform matches the user’s digital signature with the intended point of presence. The user’s true IP, location, and data usage are obfuscated while user-generated traffic is made to “originate” from a remote point of presence (PoP) or interface server.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage and improve their operations

Audience

Organizations interested in an advanced Browser Isolation platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Ericom Software
Founded: 1993
United States
www.ericom.com/solutions/browser-isolation/shield_datasheet.pdf

Company Information

Intelligent Waves
Founded: 2006
United States
intelligentwaves.com/phantom/

Alternatives

Ericom Connect

Ericom Connect

Ericom Software

Alternatives

BUFFERZONE

BUFFERZONE

Bufferzone Security
FileWall

FileWall

Odix
FortiIsolator

FortiIsolator

Fortinet
JavaScript Obfuscator Pro

JavaScript Obfuscator Pro

JavaScript Obfuscator

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Facebook
Google
Sasa Software GateScanner
TikTok
X (Twitter)
YouTube

Integrations

Facebook
Google
Sasa Software GateScanner
TikTok
X (Twitter)
YouTube
Claim Ericom Shield and update features and information
Claim Ericom Shield and update features and information
Claim Phantom and update features and information
Claim Phantom and update features and information