+
+

Related Products

  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • PowerDMARC
    252 Ratings
    Visit Website
  • Control D
    183 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

Proactively secure the web with advanced, real-time threat defenses—full content inspection and in-line security scanning help mitigate risk and protect against malware. The convenience of securing your global workforce with a single endpoint for Web Security, DLP, CASB, and NGFW with flexible connectivity and traffic redirection options. Deploy how, when and where you want. On-premises, hybrid and cloud deployment architectures so you can go to the cloud at your own pace. Behavioral analytics and inline capabilities secure your policies and data across the world. Consistent policies with robust access control for all your sites, cloud apps, and users both on and off the corporate network. Keep users safe from malicious threats, including zero-day threats. Protect against zero-day threats with real-time threat intelligence and remote browser isolation, and provide deep content inspection for encrypted and unencrypted traffic to detect evolving threats across the entire kill chain.

About

odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone looking for a Secure Web Gateway solution

Audience

Enterprise organizations that need a powerful malware prevention and content disarm and reconstruction (CDR) solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Forcepoint
Founded: 1994
United States
www.forcepoint.com/product/secure-web-gateway

Company Information

odix
Founded: 2009
United States
www.odi-x.com

Alternatives

Artica Proxy

Artica Proxy

Artica Tech

Alternatives

FileWall

FileWall

Odix
AT&T Secure Web Gateway

AT&T Secure Web Gateway

AT&T Cybersecurity
Falcon Sandbox

Falcon Sandbox

CrowdStrike
FortiGate IPS

FortiGate IPS

Fortinet

Categories

Categories

Integrations

Active Directory
Amazon Web Services (AWS)
Ericom Connect
Forcepoint ONE
Okta
Ping Identity
PwC Amplifier
Seclore EDRM
Splunk Cloud Platform

Integrations

Active Directory
Amazon Web Services (AWS)
Ericom Connect
Forcepoint ONE
Okta
Ping Identity
PwC Amplifier
Seclore EDRM
Splunk Cloud Platform
Claim Forcepoint Secure Web Gateway and update features and information
Claim Forcepoint Secure Web Gateway and update features and information
Claim odix and update features and information
Claim odix and update features and information