Audience

Anyone looking for a remote browsing solution

About Cigloo Browser Isolation Management Platform

Cigloo Browser Isolation Management Platform acts as a web proxy between corporate users and the virtual technology environment. Cigloo can be implemented internally or on the cloud. Cigloo controls and isolates any web content execution using an advanced rule engine, determining where the web content is anonymously executed and which browser is used, based on user privileges, location and the requested website.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Cigloo
Founded: 2017
Israel
cigloo.io

Videos and Screen Captures

Cigloo Browser Isolation Management Platform Screenshot 1
Other Useful Business Software
Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
Compliant and Reliable File Transfers Backed by Top Security Certifications

Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Start Free Trial

Product Details

Platforms Supported
Cloud
Training
Live Online
Support
Online

Cigloo Browser Isolation Management Platform Frequently Asked Questions

Q: What kinds of users and organization types does Cigloo Browser Isolation Management Platform work with?
Q: What languages does Cigloo Browser Isolation Management Platform support in their product?
Q: What kind of support options does Cigloo Browser Isolation Management Platform offer?
Q: What type of training does Cigloo Browser Isolation Management Platform provide?

Cigloo Browser Isolation Management Platform Product Features

IT Security

Email Attachment Protection
Event Tracking
Web Threat Management
Web Traffic Reporting
Anti Spam
Anti Virus
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting
Compliance Reporting