{"id":309,"date":"2016-08-10T12:59:16","date_gmt":"2016-08-10T09:59:16","guid":{"rendered":"https:\/\/experis.co.il\/cyber\/?page_id=309"},"modified":"2021-06-07T16:26:29","modified_gmt":"2021-06-07T13:26:29","slug":"internet-cloud-security","status":"publish","type":"page","link":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/","title":{"rendered":"Internet &#038; Cloud Security"},"content":{"rendered":"<hr style=\"border-color:#999999;border-width:1px\" \/>\n<h2 style=\"text-align: center;\">Internet &amp; Cloud security<\/h2>\n<h6 style=\"text-align: center;\">Award-winning platform provides secure and efficient network communication for any user, from any device at any location, constantly.<\/h6>\n<hr style=\"border-color:#999999;border-width:1px\" \/>\n<h5 dir=\"ltr\" style=\"text-align: left;\">The World's Leading Internet &amp; Cloud security Technology<\/h5>\n<p dir=\"ltr\" style=\"text-align: left;\">\u00a0We use\u00a0ZScaler's winning technology, leading the Gartner's reports for the 6th year in a row as the best\u00a0cloud&amp; internet security platform.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">The ZScaler platform is the world's largest global security database, deployed in over 100 data centers, while maintaining unparalleled performance with near-zero latency.<\/p>\n<h5 dir=\"ltr\">How Does It Work?<\/h5>\n<p dir=\"ltr\" style=\"text-align: left;\">The ZScaler platform is implemented at the network gateway, between the organization and the Internet. It scan's every byte including encrypted traffic. Our experts are constantly filtering and analyzing the information flowing in and out of the organization, using\u00a0\u00a0Incidence response procedures and tested methodologies to\u00a0gain full perspective of current threats and countermeasures to be taken.<\/p>\n<h5 dir=\"ltr\" style=\"text-align: center;\">Combined power and efficiency<\/h5>\n<p dir=\"ltr\" style=\"text-align: center;\">\u00a0The combined solution:\u00a0our SOC with the ZScaler platform, allows us to\u00a0offer secured web-browsing against advanced persistent threats (APT), with data loss prevention (DLP); SSL decryption; network traffic control; management of organizational security policy and cyber-intelligence &#8211; all this without requiring any upkeep of local hardware or software.<\/p>\n<hr style=\"border-color:#ff971c;border-width:1px\" \/>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg\" alt=\"\" \/><\/p>\n<h3 style=\"text-align:center;color:#ef8428;font-size:19px\">Security<\/h3>\n<h6>Threat Protection<\/h6>\n<p>Bi-directional scan of every byte passing through the network. Blocking of malicious software and cyber-attacks by multiple security layers: MD5 signature blocking, anti-virus engines, IDS, content scanning, machine learning, risk assessment, SSL decryption, cloud mining, risk profiling, sandboxing, APT countermeasures, and other measures.<\/p>\n<h6>Sandboxing \/ Behavioral Analysis<\/h6>\n<p>Defense against Zero-Day threats and ATP by detecting suspicious objects and triggering them within virtual 'sandboxes'. Malicious behavior is recorded and analyzed, and malicious objects are automatically blocked. This is performed simultaneously for 13 million connected platform users, practically in real time.<\/p>\n<hr style=\"border-color:#cccccc;border-width:1px\" \/>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-PROTECTION-icon2.jpeg\" alt=\"\" \/><\/p>\n<h3 style=\"text-align:center;color:#ef8428;font-size:19px\">Policy &#038; Compliance<\/h3>\n<h6>URL Filtering<\/h6>\n<p>Limiting organizational exposure to risks associated with data-loss, by management of web access by users, groups and locales. URL's are filtered according to their global reputation.<\/p>\n<h6>Cloud Application Command and Control<\/h6>\n<p>Detection, monitoring and control over cloud-based applications. Defining an individual policy to ensure secure utilization of critical cloud-based applications, as well as an option to limit use by users, groups and locales.<\/p>\n<h6>Bandwidth Control<\/h6>\n<p>Simple and effective allocation of bandwidth to prioritize critical business applications over leisure use.<\/p>\n<h6>Data Loss Prevention<\/h6>\n<p>Complete control over network traffic, including SSL encrypted data, in order to prevent loss of sensitive information or intellectual property.<\/p>\n<hr style=\"border-color:#cccccc;border-width:1px\" \/>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-PROTECTION-icon3.jpeg\" alt=\"\" \/><\/p>\n<h3 style=\"text-align:center;color:#ef8428;font-size:19px\">Management and Visibility<\/h3>\n<h6>Central Policy Management &amp; Reporting<\/h6>\n<p>Defining a unified policy for all aspects of security, web access management and data-loss prevention, with changes instantly reflected throughout the cloud. A central management interface provides view and analysis of all traffic, including all network assets at any place and in real time.<\/p>\n<h6>SIEM Integration<\/h6>\n<p>ZScaler's Nanolog NSS service smoothly transfers logs from the company cloud into the organizational network. The NSS service allows regulation compliance regarding local log archives.<\/p>\n<hr style=\"border-color:#ff971c;border-width:1px\" \/>\n<h2 style=\"text-align: center;\">Unmatched Benefits<\/h2>\n<hr style=\"border-color:#ff971c;border-width:1px\" \/>\n\t\t\t\t\t\t<a data-toggle=\"collapse\" data-parent=\"#pojo-accordion-1\" href=\"#pojo-tab-item-1-0\"><br \/>\n\t\t\t\t\t\t\tSimplicity and Cost-Effectiveness\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\u2022 State-of-the-art technology, constantly updated to handle new threats<br \/>\n\u2022 Security experts at your service 24\/7<br \/>\n\u2022 Intervention team is ready to respond immediately to any threat<br \/>\n\u2022 A cost-effective model, saving you the cost of deploying an internal data security array for your organization<br \/>\n\t\t\t\t\t\t<a data-toggle=\"collapse\" data-parent=\"#pojo-accordion-1\" href=\"#pojo-tab-item-1-1\"><br \/>\n\t\t\t\t\t\t\tComprehensive security for the organization\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\u2022 Complete protection of all network traffic, devices and users (including loT)<br \/>\n\u2022 Immediate and continuous protection enabling rapid response to threats and data-loss<br \/>\n\u2022 Blocking of data theft and botnet communication with infected devices<br \/>\n\u2022 Control of SSL encrypted traffic detects and blocks threats and data-leaks hidden within<br \/>\n\u2022 Instant, cross-cloud security updates &#8211; upon learning of a new threat, all 13 million platform users are instantly protected<br \/>\n\t\t\t\t\t\t<a data-toggle=\"collapse\" data-parent=\"#pojo-accordion-1\" href=\"#pojo-tab-item-1-2\"><br \/>\n\t\t\t\t\t\t\tPolicy Management and Reporting\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\u2022 Complete, real-time view of network usage, per user, group or locale<br \/>\n\u2022 Implementing an individual access policy to cloud-based applications by users, groups and locales<br \/>\n\u2022 Thorough reports, security analyses and access to research via a central management terminal<br \/>\n\u2022 Displaying logs, creating reports and cross-referencing data for devices, locations and applications<br \/>\n\u2022 Global policy management &#8211; a unified security policy protects users wherever they use the organizational network\t\t\t\t\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet &amp; Cloud security Award-winning platform provides secure and efficient network communication for any user, from any device at any location, constantly. The World's Leading Internet &amp; Cloud security Technology \u00a0We use\u00a0ZScaler's winning technology, leading the Gartner's reports for the 6th year in a row as the best\u00a0cloud&amp; internet security platform. The ZScaler platform is [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":366,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internet &amp; Cloud Security - Experis Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet &amp; Cloud Security - Experis Cyber\" \/>\n<meta property=\"og:description\" content=\"Internet &amp; Cloud security Award-winning platform provides secure and efficient network communication for any user, from any device at any location, constantly. The World&#039;s Leading Internet &amp; Cloud security Technology \u00a0We use\u00a0ZScaler&#039;s winning technology, leading the Gartner&#039;s reports for the 6th year in a row as the best\u00a0cloud&amp; internet security platform. The ZScaler platform is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Experis Cyber\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T13:26:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 \u05d3\u05e7\u05d5\u05ea\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/\",\"url\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/\",\"name\":\"Internet & Cloud Security - Experis Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg\",\"datePublished\":\"2016-08-10T09:59:16+00:00\",\"dateModified\":\"2021-06-07T13:26:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage\",\"url\":\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg\",\"contentUrl\":\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg\",\"width\":33,\"height\":39},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05d3\u05e3 \u05d4\u05d1\u05d9\u05ea\",\"item\":\"https:\/\/experis.co.il\/cyber\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/experis.co.il\/cyber\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Internet &#038; Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/experis.co.il\/cyber\/#website\",\"url\":\"https:\/\/experis.co.il\/cyber\/\",\"name\":\"Experis Cyber\",\"description\":\"Advanced Cyber security managed services\",\"publisher\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/experis.co.il\/cyber\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/experis.co.il\/cyber\/#organization\",\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05d4\u05d2\u05e0\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Experis Cyber\",\"url\":\"https:\/\/experis.co.il\/cyber\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/experis.co.il\/cyber\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/07\/wsi-imageoptim-logo-experis-cyber.jpeg\",\"contentUrl\":\"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/07\/wsi-imageoptim-logo-experis-cyber.jpeg\",\"width\":255,\"height\":63,\"caption\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05d4\u05d2\u05e0\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Experis Cyber\"},\"image\":{\"@id\":\"https:\/\/experis.co.il\/cyber\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet & Cloud Security - Experis Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/","og_locale":"he_IL","og_type":"article","og_title":"Internet & Cloud Security - Experis Cyber","og_description":"Internet &amp; Cloud security Award-winning platform provides secure and efficient network communication for any user, from any device at any location, constantly. The World's Leading Internet &amp; Cloud security Technology \u00a0We use\u00a0ZScaler's winning technology, leading the Gartner's reports for the 6th year in a row as the best\u00a0cloud&amp; internet security platform. The ZScaler platform is [&hellip;]","og_url":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/","og_site_name":"Experis Cyber","article_modified_time":"2021-06-07T13:26:29+00:00","og_image":[{"url":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da":"3 \u05d3\u05e7\u05d5\u05ea"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/","url":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/","name":"Internet & Cloud Security - Experis Cyber","isPartOf":{"@id":"https:\/\/experis.co.il\/cyber\/#website"},"primaryImageOfPage":{"@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg","datePublished":"2016-08-10T09:59:16+00:00","dateModified":"2021-06-07T13:26:29+00:00","breadcrumb":{"@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#primaryimage","url":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg","contentUrl":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/08\/wsi-imageoptim-COMPLIANCE-icon-3.jpeg","width":33,"height":39},{"@type":"BreadcrumbList","@id":"https:\/\/experis.co.il\/cyber\/en\/services\/internet-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05d3\u05e3 \u05d4\u05d1\u05d9\u05ea","item":"https:\/\/experis.co.il\/cyber\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/experis.co.il\/cyber\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Internet &#038; Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/experis.co.il\/cyber\/#website","url":"https:\/\/experis.co.il\/cyber\/","name":"Experis Cyber","description":"Advanced Cyber security managed services","publisher":{"@id":"https:\/\/experis.co.il\/cyber\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/experis.co.il\/cyber\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/experis.co.il\/cyber\/#organization","name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05d4\u05d2\u05e0\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Experis Cyber","url":"https:\/\/experis.co.il\/cyber\/","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/experis.co.il\/cyber\/#\/schema\/logo\/image\/","url":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/07\/wsi-imageoptim-logo-experis-cyber.jpeg","contentUrl":"https:\/\/experis.co.il\/cyber\/wp-content\/uploads\/2016\/07\/wsi-imageoptim-logo-experis-cyber.jpeg","width":255,"height":63,"caption":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5\u05d4\u05d2\u05e0\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 - Experis Cyber"},"image":{"@id":"https:\/\/experis.co.il\/cyber\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/pages\/309"}],"collection":[{"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":116,"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/pages\/309\/revisions"}],"predecessor-version":[{"id":4075,"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/pages\/309\/revisions\/4075"}],"up":[{"embeddable":true,"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/pages\/366"}],"wp:attachment":[{"href":"https:\/\/experis.co.il\/cyber\/wp-json\/wp\/v2\/media?parent=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}