Secure user authentication
For companies with complex and diverse IT infrastructures, integrating a new solution requires taking into account that users may use a variety of authentication technologies, sometimes simultaneously. Symantec SWG implements the largest number of authentication methods, which allows this solution to be used even when support for exotic authentication schemes is required.
Access to many websites is now protected by SSL, even search and gaming sites use this protocol. SSL traffic can transmit important documents, malware, and any other web content. The share of such traffic is large and continues to grow. Symantec SWG has exceptional capabilities for processing and analyzing SSL traffic. Additionally, the Encrypted Tap function, unique to systems of this class, allows you to transfer the contents of SSL traffic to third-party kenya mobile database for additional analysis, archiving, and incident investigation. Symantec SWG provides control and full visibility of the content in SSL traffic, preventing cybercriminals from using SSL to hide the delivery of malicious code through a web channel.
Integration with other security systems
It is unlikely to detect a complex dangerous attack within one separate level of presentation, system, process. It is necessary to combine business processes, data from various analytical systems, data on different objects and people. The coordinated work of interconnected systems makes it possible to effectively reduce risks. Symantec SWG is an important component of the Symantec security ecosystem, but at the same time, it effectively interacts with security systems from other manufacturers.