SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Everywhere Solution Overview



Connect to the Internet with Confidence on                                      Internet and Mobile Security
Any Device. Anywhere. Anytime.                                                  Delivered Through the Cloud
Cloud computing shifts company data from IT-controlled networks to the
                                                                                B E TTE R PE R F O R MAN CE
Internet. BYOD initiatives shift device ownership from IT teams to users.
                                                                                • No new latency.
Despite today’s disruptive forces, Umbrella enables IT to gain (and re-
gain lost) visibility and control over these distributed networks, devices      • Instant, infinite scalability.
and data. Secure every connection. Protect all data. Enforce all usage.         • Always available with 100% uptime.
Prevent Inbound Malware and Contain Outbound Botnets.                           • No traffic backhauls.
    •   Protect any device connected to one or thousands of network             • No battery drains.
        gateways and Wi-Fi hotspots across the distributed enterprise.
                                                                                • Data centers distributed worldwide.
    •   Add deep insight into security threats, policies, users, computers
        and groups within these distributed enterprise networks.                MO R E SE CU R ITY B R E AD TH
    •   Protect any roaming computer or mobile device connecting to any         • Data and application agnostic.
        non-controlled untrusted or wireless network supporting mobility.       • Protocol and port agnostic.

    •   Or get it all! Protection, visibility and control everywhere.           • Centralized visibility and control
                                                                                  across distributed enterprises.
                                                                                • Location-aware policy enforcement.
                                       UMBRELLA
                                 Security                                       • Backed by the world’s largest
                                                                                  Internet-Wide Security Network.
                                   Cloud
                                                                                • Intelligence from 50M+ Internet
                          powered by                                              users and Umbrella Security Labs.

                          SECURE CHANNEL                                        SIMPL E
                           via          Global Network                          • No hardware to install.
                                                                                • No software to maintain.
                                                                                • No computers to manage.
                        WI-FI NETWORK      PER    PER     PER
                      HOTSPOTS GATEWAYS    USER COMPUTER GROUP
                                                                                • No major network topology changes.
                                                                                • Cloud-hosted management console
                             UMBRELLA                       UMBRELLA              and data storage requires no training.
                     Enterprise                      Insights                   • Instant access to new features and
                                                                                  improvements.
                                           UMBRELLA
                                 Everywhere                                     • Automated updates for Umbrella
                                                                                  Security Cloud, Dashboard and
                                          UMBRELLA                                other components.
                                       Mobility
                                                                                For a free trial or more sales
                            ROAMING               MOBILE                        information, contact our team:
                           COMPUTERS              DEVICES
                                                                                1-877-811-2367
                                                                                www.umbrella.com
Always-On Protection via a Secure Channel                                                                    Who Uses the Umbrella
Cloud computing and BYOD initiatives enable ubiquitous connectivity for
both business and personal use. Users now access sensitive company
                                                                                                             Security Cloud and Why?
data from untrusted networks on any device. Often without enterprise-
                                                                                                             L AR G E O R G AN IZATIO N S
grade security. Ensure Internet-wide protection every time, on every
                                                                                                             • Fortune 100 corporations improving
network, by enabling a secure channel to the Umbrella Security Cloud.
                                                                                                                their defense-in-depth strategies for
                                                                                                                advanced threats such as botnets.
Gain Visibility and Control Everywhere.                                                                      • Securing distributed global networks
    •   For the first time, enforce IT- or user-owned roaming computers                                        and/or BYOD programs.
        or mobile devices via Wi-Fi hotspot and wireless carrier networks.
                                                                                                             SMAL L TO ME D IU M B U SIN E SSE S
    •   Re-gain previously lost enforcement when nomadic workers use
                                                                                                             • Over 3,000 businesses eliminating
        laptops roaming outside the network perimeter.                                                         complexity and performance issues,
    •   Run reports with actionable intelligence or change policies via                                        while improving Internet security.
        the cloud-hosted Umbrella Dashboard. Anywhere. Anytime.
                                                                                                             K -12 E D U CATIO N
                                                                                                             • 40,000 (or 1 in 3) U.S. schools rely
Internet-Wide Protection from Bad Hosts.                                                                        on it to achieve CIPA compliance.
    •   Prevent new infections caused by devices connecting to bad
                                                                                                             • Support 1:1 computing initiatives.
        hosts distributing, or redirecting users to, malware.

    •   Contain data leaks and other cybercrime caused by infected                                           H IG H E R E D U CATIO N
        devices connecting to bad hosts participating in botnets.                                            • Provide a safe campus network for
                                                                                                                students’ devices to connect to.
    •   Prevent user ID (and company data) theft caused by social
        engineering that misdirect users to visit bad hosts with phishing.                                   • Stop botnet & P2P communications
                                                                                                               from consuming network bandwidth.
    •   Filter inappropriate usage caused by users connecting to Web or
        non-Web servers hosting unacceptable content or applications.                                        R E TAIL , H O SPITAL ITY & H O TSPO TS
                                                                                                             • Provide family-friendly or workplace-
Global Protection from Non-Controlled Untrusted Networks.                                                      appropriate Internet access for up to
                                                                                                               1000s of locations. In minutes.
    •   Keep communications from roaming computers and mobile
        devices private and protected via an encrypted, secure channel.
                                                                                                             MAN AG E D SE R VICE PR O VID E R S
                                                                                                             • Easy provisioning with no
Zero Impact on Business-Critical Internet Access.                                                              maintenance burdens to protect
                                                                                                               100s of their customers.
    •   Lightweight combination of DNS-traffic-only routing and selective
        proxying to maintain network performance at scale with no added
        latency and zero downtime.                                                                           H O ME U SE R S
                                                                                                             • Over 50 million people around the
                                                                                                               world choosing a faster, smarter and
Low Total Cost of Ownership.                                                                                   more reliable Internet experience.
    •   Fast and easy rollout across multiple sites. Provision, deploy and
        setup Umbrella in less than 30 minutes.
                                                                                                             For a free trial or more sales
    •   Reduced investment. No additional hardware or software spends.                                       information, contact our team:
    •   No traditional maintenance or training burdens. Speed, reliability,                                  1-877-811-2367
        availability and accuracy are maintained by the Umbrella service.                                    www.umbrella.com


                        Umbrella is a cloud security service that protects users everywhere against malware, botnets and phishing regardless of location or device,
                        including nomadic users on iPhones, iPads, and Windows and Mac laptops. Umbrella leverages the OpenDNS Global Network, the world’s
                        largest Internet-wide security network, serving 50 million active users daily. Unlike security products that reduce performance by
                        backhauling traffic through hardware appliances or slow VPNs, Umbrella actually improves performance with a lightweight combination of
                        DNS routing and selective proxying. Organizations gain visibility across today’s mobile workforce using cloud applications and services. Users
                        always get a secure connection, whether in the office, at home or on the go.

Contenu connexe

Tendances

Ruckus tech edit-062011
Ruckus tech edit-062011Ruckus tech edit-062011
Ruckus tech edit-062011thuongdang1511
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Ubiquisys Smart Cells CTIA Wireless 12
Ubiquisys Smart Cells CTIA Wireless 12Ubiquisys Smart Cells CTIA Wireless 12
Ubiquisys Smart Cells CTIA Wireless 12Ubiquisys Small Cells
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Simplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based SolutionsSimplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based SolutionsSymantec
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric BrochureArrow ECS UK
 
Small Cells Asia 2012 : Ubiquisys Smart Cells
Small Cells Asia 2012 : Ubiquisys Smart CellsSmall Cells Asia 2012 : Ubiquisys Smart Cells
Small Cells Asia 2012 : Ubiquisys Smart CellsUbiquisys Small Cells
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
CIMCO Network
CIMCO NetworkCIMCO Network
CIMCO NetworkSara Webb
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Jiunn-Jer Sun
 
Cloudview Brochure
Cloudview BrochureCloudview Brochure
Cloudview BrochureDave Burt
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 

Tendances (14)

Ruckus tech edit-062011
Ruckus tech edit-062011Ruckus tech edit-062011
Ruckus tech edit-062011
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Ubiquisys Smart Cells CTIA Wireless 12
Ubiquisys Smart Cells CTIA Wireless 12Ubiquisys Smart Cells CTIA Wireless 12
Ubiquisys Smart Cells CTIA Wireless 12
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Simplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based SolutionsSimplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based Solutions
 
Enterasys OneFabric Brochure
Enterasys OneFabric BrochureEnterasys OneFabric Brochure
Enterasys OneFabric Brochure
 
Small Cells Asia 2012 : Ubiquisys Smart Cells
Small Cells Asia 2012 : Ubiquisys Smart CellsSmall Cells Asia 2012 : Ubiquisys Smart Cells
Small Cells Asia 2012 : Ubiquisys Smart Cells
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
CIMCO Network
CIMCO NetworkCIMCO Network
CIMCO Network
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Cloudview Brochure
Cloudview BrochureCloudview Brochure
Cloudview Brochure
 
Nx9500 datasheet
Nx9500 datasheetNx9500 datasheet
Nx9500 datasheet
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 

En vedette

Tech Doc: Umbrella Delivery Platform
Tech Doc: Umbrella Delivery PlatformTech Doc: Umbrella Delivery Platform
Tech Doc: Umbrella Delivery PlatformCourtland Smith
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In BreadthCourtland Smith
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
OpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&COpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&CCourtland Smith
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlOpenDNS
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - BriefAshley Deuble
 

En vedette (7)

Tech Doc: Umbrella Delivery Platform
Tech Doc: Umbrella Delivery PlatformTech Doc: Umbrella Delivery Platform
Tech Doc: Umbrella Delivery Platform
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
OpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&COpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&C
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 

Similaire à Datasheet: Umbrella Everywhere Solution Overview

Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochureguillaumepays
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleSACHIN SHARMA
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Networks
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2thidisbogus
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBootOpSource
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkJuniper Networks
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Tridium Telecom Profile
Tridium Telecom ProfileTridium Telecom Profile
Tridium Telecom Profilemcl221
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Gridgueste0b5fe
 

Similaire à Datasheet: Umbrella Everywhere Solution Overview (20)

Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006
 
Esc who we are 2016 rev2
Esc who we are 2016 rev2Esc who we are 2016 rev2
Esc who we are 2016 rev2
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBoot
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere Network
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Tridium Telecom Profile
Tridium Telecom ProfileTridium Telecom Profile
Tridium Telecom Profile
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
Top 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper WirelessTop 10 Reasons Enterprises Prefer Juniper Wireless
Top 10 Reasons Enterprises Prefer Juniper Wireless
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 

Datasheet: Umbrella Everywhere Solution Overview

  • 1. Everywhere Solution Overview Connect to the Internet with Confidence on Internet and Mobile Security Any Device. Anywhere. Anytime. Delivered Through the Cloud Cloud computing shifts company data from IT-controlled networks to the B E TTE R PE R F O R MAN CE Internet. BYOD initiatives shift device ownership from IT teams to users. • No new latency. Despite today’s disruptive forces, Umbrella enables IT to gain (and re- gain lost) visibility and control over these distributed networks, devices • Instant, infinite scalability. and data. Secure every connection. Protect all data. Enforce all usage. • Always available with 100% uptime. Prevent Inbound Malware and Contain Outbound Botnets. • No traffic backhauls. • Protect any device connected to one or thousands of network • No battery drains. gateways and Wi-Fi hotspots across the distributed enterprise. • Data centers distributed worldwide. • Add deep insight into security threats, policies, users, computers and groups within these distributed enterprise networks. MO R E SE CU R ITY B R E AD TH • Protect any roaming computer or mobile device connecting to any • Data and application agnostic. non-controlled untrusted or wireless network supporting mobility. • Protocol and port agnostic. • Or get it all! Protection, visibility and control everywhere. • Centralized visibility and control across distributed enterprises. • Location-aware policy enforcement. UMBRELLA Security • Backed by the world’s largest Internet-Wide Security Network. Cloud • Intelligence from 50M+ Internet powered by users and Umbrella Security Labs. SECURE CHANNEL SIMPL E via Global Network • No hardware to install. • No software to maintain. • No computers to manage. WI-FI NETWORK PER PER PER HOTSPOTS GATEWAYS USER COMPUTER GROUP • No major network topology changes. • Cloud-hosted management console UMBRELLA UMBRELLA and data storage requires no training. Enterprise Insights • Instant access to new features and improvements. UMBRELLA Everywhere • Automated updates for Umbrella Security Cloud, Dashboard and UMBRELLA other components. Mobility For a free trial or more sales ROAMING MOBILE information, contact our team: COMPUTERS DEVICES 1-877-811-2367 www.umbrella.com
  • 2. Always-On Protection via a Secure Channel Who Uses the Umbrella Cloud computing and BYOD initiatives enable ubiquitous connectivity for both business and personal use. Users now access sensitive company Security Cloud and Why? data from untrusted networks on any device. Often without enterprise- L AR G E O R G AN IZATIO N S grade security. Ensure Internet-wide protection every time, on every • Fortune 100 corporations improving network, by enabling a secure channel to the Umbrella Security Cloud. their defense-in-depth strategies for advanced threats such as botnets. Gain Visibility and Control Everywhere. • Securing distributed global networks • For the first time, enforce IT- or user-owned roaming computers and/or BYOD programs. or mobile devices via Wi-Fi hotspot and wireless carrier networks. SMAL L TO ME D IU M B U SIN E SSE S • Re-gain previously lost enforcement when nomadic workers use • Over 3,000 businesses eliminating laptops roaming outside the network perimeter. complexity and performance issues, • Run reports with actionable intelligence or change policies via while improving Internet security. the cloud-hosted Umbrella Dashboard. Anywhere. Anytime. K -12 E D U CATIO N • 40,000 (or 1 in 3) U.S. schools rely Internet-Wide Protection from Bad Hosts. on it to achieve CIPA compliance. • Prevent new infections caused by devices connecting to bad • Support 1:1 computing initiatives. hosts distributing, or redirecting users to, malware. • Contain data leaks and other cybercrime caused by infected H IG H E R E D U CATIO N devices connecting to bad hosts participating in botnets. • Provide a safe campus network for students’ devices to connect to. • Prevent user ID (and company data) theft caused by social engineering that misdirect users to visit bad hosts with phishing. • Stop botnet & P2P communications from consuming network bandwidth. • Filter inappropriate usage caused by users connecting to Web or non-Web servers hosting unacceptable content or applications. R E TAIL , H O SPITAL ITY & H O TSPO TS • Provide family-friendly or workplace- Global Protection from Non-Controlled Untrusted Networks. appropriate Internet access for up to 1000s of locations. In minutes. • Keep communications from roaming computers and mobile devices private and protected via an encrypted, secure channel. MAN AG E D SE R VICE PR O VID E R S • Easy provisioning with no Zero Impact on Business-Critical Internet Access. maintenance burdens to protect 100s of their customers. • Lightweight combination of DNS-traffic-only routing and selective proxying to maintain network performance at scale with no added latency and zero downtime. H O ME U SE R S • Over 50 million people around the world choosing a faster, smarter and Low Total Cost of Ownership. more reliable Internet experience. • Fast and easy rollout across multiple sites. Provision, deploy and setup Umbrella in less than 30 minutes. For a free trial or more sales • Reduced investment. No additional hardware or software spends. information, contact our team: • No traditional maintenance or training burdens. Speed, reliability, 1-877-811-2367 availability and accuracy are maintained by the Umbrella service. www.umbrella.com Umbrella is a cloud security service that protects users everywhere against malware, botnets and phishing regardless of location or device, including nomadic users on iPhones, iPads, and Windows and Mac laptops. Umbrella leverages the OpenDNS Global Network, the world’s largest Internet-wide security network, serving 50 million active users daily. Unlike security products that reduce performance by backhauling traffic through hardware appliances or slow VPNs, Umbrella actually improves performance with a lightweight combination of DNS routing and selective proxying. Organizations gain visibility across today’s mobile workforce using cloud applications and services. Users always get a secure connection, whether in the office, at home or on the go.