<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[InstaSafe Solutions]]></title><description><![CDATA[InstaSafe Solutions]]></description><link>https://instasafe.com/solutions/</link><image><url>https://instasafe.com/solutions/favicon.png</url><title>InstaSafe Solutions</title><link>https://instasafe.com/solutions/</link></image><generator>Ghost 5.89</generator><lastBuildDate>Sun, 05 Apr 2026 14:52:15 GMT</lastBuildDate><atom:link href="https://instasafe.com/solutions/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[InstaSafe Stick - Access using USB]]></title><description><![CDATA[InstaSafe stick only allows access to corporate applications and blocks the internet from browsing any external sites. With InstaSafe ZTA and MFA, users can still experience secure and seamless access to their applications]]></description><link>https://instasafe.com/solutions/instasafe-stick-access-using-usb/</link><guid isPermaLink="false">679b50bf8963ad7c39f5c083</guid><category><![CDATA[Identity and Access Management (IDAM)]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Thu, 30 Jan 2025 10:18:44 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2025/01/InstaSafe-Stick-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2025/01/InstaSafe-Stick-1.png" alt="InstaSafe Stick - Access using USB"><p>InstaSafe stick is a lightweight portable version of an Ubuntu Operating System (OS) that can be run from a USB drive. Ubuntu OS is hardened and pre configured into the USB drive. Users need to just plug in the USB drive into their system, reboot and the system is now ready to access predefined corporate applications securely using InstaSafe Zero Trust Access solution along with Multi factor authentication.&#xA0;</p><p>InstaSafe stick only allows access to corporate applications and blocks the internet from browsing any external sites. With InstaSafe ZTA and MFA, users can still experience secure and seamless access to their applications.</p><h2 id="why-instasafe-stick">Why InstaSafe Stick?</h2><ul><li><em>Enabling Third-Party Workers </em>- Organizations need to provide third-party workers with access to certain applications in a secure manner. InstaSafe Stick can enable them with secure access.</li><li><em>Working with low-performance systems</em> - Third party workers and external consultants are often provided with outdated systems that are low in performance and does not support new software versions. The InstaSafe Stick requires minimal system configuration to run the program efficiently and provide access.</li></ul><h2 id="how-does-it-work">How does it work?</h2><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2025/01/InstaSafe-Stick.png" class="kg-image" alt="InstaSafe Stick - Access using USB" loading="lazy" width="1100" height="460" srcset="https://instasafe.com/solutions/content/images/size/w600/2025/01/InstaSafe-Stick.png 600w, https://instasafe.com/solutions/content/images/size/w1000/2025/01/InstaSafe-Stick.png 1000w, https://instasafe.com/solutions/content/images/2025/01/InstaSafe-Stick.png 1100w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;"> Application Access through InstaSafe Stick</span></figcaption></figure><h2 id="features-and-benefits">Features and Benefits</h2><ul><li>Secure Application Access - Access internal applications securely through InstaSafe ZTA</li><li>Lightweight - Preconfigured USB is lightweight and boots faster&#xA0;</li><li>Easy to Use - On the go, just plugin, reboot and start using services</li><li>Multi-Factor Authentication -&#xA0; additional security controls with secondary authentication methods</li><li><em>Device Compatibility</em>: Works across desktops and laptops, regardless of hardware specifications.</li></ul><p>Ready to experience the future of secure access? Get your InstaSafe Stick today and transform how you work.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Secure Access for Outlook Web Access (OWA)]]></title><description><![CDATA[Learn how InstaSafe secure access with its inbuilt MFA can provide seamless access with better security controls for Outlook Web Access]]></description><link>https://instasafe.com/solutions/secure-access-for-outlook-web-access/</link><guid isPermaLink="false">672b56938963ad7c39f5bffb</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 06 Nov 2024 12:58:51 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/11/Outlook-web-app-InstaSafe-.webp" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/11/Outlook-web-app-InstaSafe-.webp" alt="Secure Access for Outlook Web Access (OWA)"><p>Outlook Web Access (OWA) is one of the most popular web based email clients that is widely used by organizations. Earlier version of Outlook requires installation in the system and users used to access it through that particular system for whom Outlook is configured. With web based Outlook, users can now access their mailbox from anywhere over a browser. Microsoft Outlook Web Access (OWA) allows users to access their email, calendars, and contacts via a web browser, without requiring the installation of Microsoft Outlook or other email clients. OWA is widely utilized for its convenience and accessibility, making it a critical application for businesses worldwide.&#xA0;</p><p>This also creates security issues if the user credentials gets compromised. Better secure access solution along with MFA can provide stronger security controls for Outlook Web Access.</p><p><strong>InstaSafe Secure Access for OWA</strong></p><p>For web based applications, InstaSafe provides secure access through SAML authentication. InstaSafe can act as an identity provider and authenticate user based on user credentials and Multi factor authentication. InstaSafe MFA supports various authentication methods which includes OTP via Email or SMS, T-OTP, Biometrics, Push notifications through its authenticator application.&#xA0;</p><p><strong>Key Features:</strong></p><ol><li><strong>Enhanced Security</strong>: Multi-factor authentication adds an extra layer of security by combining something the user knows (password) with something the user has (security token or SMS code), making unauthorized access significantly more challenging.</li><li><strong>Easy Integration</strong>: Seamlessly integrates with your existing OWA setup without the need for complex configurations, ensuring a smooth transition and user experience.</li><li><strong>User-Friendly</strong>: Offers a straightforward authentication process that does not compromise on security while maintaining user convenience.</li></ol><p><strong>Benefits:</strong></p><ol><li><strong>Prevents Data Breaches</strong>: By securing email accounts against unauthorized access, MFA significantly lowers the risk of potential data breaches.</li><li><strong>Increases Trust</strong>: Enhances the trustworthiness of your IT infrastructure, making it safer for remote access.</li><li><strong>Compliance Ready</strong>: Helps in complying with various regulatory requirements that mandate strict access controls, including MFA.</li></ol><p>To know more about how InstaSafe Secure Access with MFA works for Outlook Web Access, refer to our documentation here - <a href="https://docs.instasafe.com/Zero%20Trust%20Application%20Access/owa_mfa/?ref=instasafe.com"><u>https://docs.instasafe.com/Zero%20Trust%20Application%20Access/owa_mfa/</u></a></p><p><br>Book A Demo using this link - <a href="https://instasafe.com/book-a-demo/?ref=instasafe.com"><u>https://instasafe.com/book-a-demo/</u></a> </p>]]></content:encoded></item><item><title><![CDATA[Secure Access for Google Workspace]]></title><description><![CDATA[By deploying InstaSafe’s Zero Trust Solution, organizations can significantly enhance the security of their Google Workspace environment. The solution not only protects against external cyber threats but also mitigates risks associated with insider threats and compromised devices.]]></description><link>https://instasafe.com/solutions/secure-access-for-google-workspace/</link><guid isPermaLink="false">66bc93ba8963ad7c39f5bfed</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 14 Aug 2024 11:24:12 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/11/google-workspace-InstaSafe-.webp" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/11/google-workspace-InstaSafe-.webp" alt="Secure Access for Google Workspace"><p>As organizations increasingly rely on cloud-based productivity tools, Google Workspace (formerly G Suite) has become a cornerstone for collaboration and communication. However, with this shift to cloud-based services comes the challenge of securing access to these critical resources, especially in a remote work environment. InstaSafe&#x2019;s Zero Trust Solution provides a comprehensive framework to secure access to Google Workspace, ensuring that only authenticated and authorized users can connect, regardless of their device or location.</p><h4 id="limitations-of-traditional-security-models"><strong>Limitations of Traditional Security Models</strong></h4><p>Traditional security models typically rely on perimeter-based defenses, assuming that once a user gains access to the corporate network, they can be trusted with access to internal resources, including Google Workspace. However, this approach has several inherent risks:</p><ol><li><strong>Broad Access:</strong> Once inside the network, users often have wide access to multiple resources, including Google Workspace, increasing the risk of data breaches if credentials are compromised.</li><li><strong>Device Vulnerabilities:</strong> Employees access Google Workspace from various devices, many of which may not be secured, exposing the organization to potential security threats.</li><li><strong>Phishing and Credential Theft:</strong> Attackers often exploit weaknesses in traditional security measures through phishing and credential theft, gaining unauthorized access to sensitive data stored in Google Workspace.</li></ol><h4 id="zero-trust-a-modern-approach-to-securing-google-workspace"><strong>Zero Trust: A Modern Approach to Securing Google Workspace</strong></h4><p>InstaSafe&#x2019;s Zero Trust Solution is designed to overcome the limitations of traditional security models by implementing a &quot;Never Trust, Always Verify&quot; approach. This ensures that access to Google Workspace is granted based on continuous verification of the user&apos;s identity, device, and context. Here&#x2019;s how InstaSafe enhances the security of Google Workspace:</p><ol><li><strong>Granular Access Controls:</strong> InstaSafe enables organizations to implement role-based access controls for Google Workspace, ensuring that users can only access the applications and data they need. This minimizes the risk of unauthorized access and protects sensitive information.</li><li><strong>Continuous Monitoring and Anomaly Detection:</strong> With InstaSafe, access to Google Workspace is continuously monitored, and any unusual or suspicious activity is flagged in real time. This could include login attempts from unfamiliar locations, use of unauthorized devices, or deviations from typical user behavior. Such proactive monitoring allows for immediate response to potential threats.</li><li><strong>Seamless Integration with Identity Providers:</strong> InstaSafe integrates seamlessly with identity providers like Google Identity and Access Management (IAM), enabling Single Sign-On (SSO) and Multi-Factor Authentication (MFA). These features reduce the risk of credential theft while providing a smooth user experience, as users can access Google Workspace with a single set of credentials.</li><li><strong>Context-Aware Security Policies:</strong> InstaSafe&#x2019;s Zero Trust Solution adapts to different contexts by enforcing security policies based on the user&#x2019;s location, device, and the sensitivity of the data being accessed. For example, access to sensitive Google Workspace documents might require additional verification if the user is connecting from an unrecognized device or a high-risk location.</li></ol><h4 id="the-instasafe-advantage-for-google-workspace"><strong>The InstaSafe Advantage for Google Workspace</strong></h4><p>By deploying InstaSafe&#x2019;s Zero Trust Solution, organizations can significantly enhance the security of their Google Workspace environment. The solution not only protects against external cyber threats but also mitigates risks associated with insider threats and compromised devices. With features like continuous monitoring, role-based access controls, and seamless integration with existing infrastructure, InstaSafe ensures that your organization can securely leverage the full potential of Google Workspace.</p><p>Whether your organization is already using Google Workspace or planning to migrate, InstaSafe offers a scalable and flexible security solution tailored to your specific needs.</p>]]></content:encoded></item><item><title><![CDATA[Securing Access for IceWarp Email]]></title><description><![CDATA[By implementing InstaSafe’s Zero Trust Solution, organizations can secure access to IceWarp Email without compromising on user experience. The solution not only protects against external threats but also mitigates the risks posed by insider threats and compromised devices. ]]></description><link>https://instasafe.com/solutions/securing-access-for-icewarp-email/</link><guid isPermaLink="false">66bc92398963ad7c39f5bfe1</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 14 Aug 2024 11:17:50 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/11/Ice-wrap-InstaSafe-.webp" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/11/Ice-wrap-InstaSafe-.webp" alt="Securing Access for IceWarp Email"><p>In the rapidly evolving digital landscape, email remains a critical communication tool for businesses. IceWarp Email, with its comprehensive suite of features, is a popular choice for enterprises looking to streamline communication and collaboration. However, as with any email platform, ensuring secure access is crucial to protect sensitive information from unauthorized access and cyber threats. InstaSafe&#x2019;s Zero Trust Solution offers a robust framework to secure access to IceWarp Email, ensuring that only verified users can access the platform, regardless of their location or device.</p><h4 id="challenges-with-traditional-email-security"><strong>Challenges with Traditional Email Security</strong></h4><p>Traditional security methods often rely on perimeter-based defenses, assuming that once a user is within the network, they can be trusted with access to sensitive resources. However, this approach is flawed, especially in today&#x2019;s environment, where users frequently access emails from various devices and networks, including unsecured public Wi-Fi.</p><p>Such perimeter-based security models can lead to significant vulnerabilities:</p><ol><li><strong>Unauthorized Access:</strong> If credentials are compromised, unauthorized users can gain access to the entire email system, potentially leading to data breaches.</li><li><strong>Device Vulnerabilities:</strong> Devices used to access IceWarp Email might be compromised, leading to the spread of malware or unauthorized access to corporate resources.</li><li><strong>Phishing Attacks:</strong> Phishing attacks remain one of the most common methods used by attackers to gain access to email accounts, especially when multi-factor authentication (MFA) is not enforced.</li></ol><h4 id="zero-trust-the-future-of-email-security"><strong>Zero Trust: The Future of Email Security</strong></h4><p>InstaSafe&#x2019;s Zero Trust Solution is designed to address these challenges by implementing a &quot;Never Trust, Always Verify&quot; approach to security. Here&#x2019;s how it enhances the security of IceWarp Email:</p><ol><li><strong>Role-Based Access Controls:</strong> InstaSafe enables granular access control policies based on user roles and responsibilities. This ensures that users have access only to the emails and resources they need, reducing the risk of unauthorized access.</li><li><strong>Continuous Monitoring and Threat Detection:</strong> The Zero Trust framework continuously monitors user activity across IceWarp Email. If any unusual behavior is detected&#x2014;such as logins from unfamiliar locations or attempts to access unauthorized resources&#x2014;InstaSafe can automatically trigger additional verification steps or block access.</li><li><strong>Seamless Integration with Identity Providers:</strong> InstaSafe seamlessly integrates with existing identity providers, such as Active Directory or LDAP. This allows for Single Sign-On (SSO) and Multi-Factor Authentication (MFA) capabilities, making it easier for users to securely access IceWarp Email without the need for multiple passwords.</li><li><strong>Adaptive Security Policies:</strong> InstaSafe&#x2019;s solution adapts to changing security landscapes by enforcing context-aware security policies. For instance, if a user attempts to access IceWarp Email from an unfamiliar device or location, they may be required to pass additional security checks before access is granted.</li></ol><h4 id="the-instasafe-advantage-for-icewarp-email"><strong>The InstaSafe Advantage for IceWarp Email</strong></h4><p>By implementing InstaSafe&#x2019;s Zero Trust Solution, organizations can secure access to IceWarp Email without compromising on user experience. The solution not only protects against external threats but also mitigates the risks posed by insider threats and compromised devices. With features like real-time monitoring, adaptive security, and seamless integration with existing IT infrastructure, InstaSafe ensures that your IceWarp Email system remains secure and resilient against evolving cyber threats.</p><p>Whether your organization is already using IceWarp Email or considering its adoption, InstaSafe offers a scalable, flexible security solution that can be tailored to meet your specific needs.</p>]]></content:encoded></item><item><title><![CDATA[Securing Access for Microsoft 365]]></title><description><![CDATA[By deploying InstaSafe’s Zero Trust Solution, organizations can achieve a higher level of security for their Microsoft 365 environment. This solution not only protects against external threats but also addresses the risks posed by insider threats and compromised devices.]]></description><link>https://instasafe.com/solutions/securing-access-for-microsoft-365/</link><guid isPermaLink="false">66bc916b8963ad7c39f5bfd5</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 14 Aug 2024 11:15:03 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/11/microsoft-365-InstaSafe-.webp" medium="image"/><content:encoded><![CDATA[<h3 id="securing-access-to-microsoft-365-with-instasafe-zero-trust"><strong>Securing Access to Microsoft 365 with InstaSafe Zero Trust</strong></h3><img src="https://instasafe.com/solutions/content/images/2024/11/microsoft-365-InstaSafe-.webp" alt="Securing Access for Microsoft 365"><p>In today&apos;s digital workspace, where remote work and cloud-based tools are becoming the norm, ensuring secure access to critical applications like Microsoft 365 is paramount. With an ever-increasing number of cyber threats, traditional security models that rely on implicit trust are no longer sufficient. InstaSafe&#x2019;s Zero Trust Solution offers a modern approach to securing access, ensuring that only authenticated and authorized users can connect to your Microsoft 365 environment, regardless of their location or device.</p><h4 id="why-traditional-security-models-fall-short"><strong>Why Traditional Security Models Fall Short</strong></h4><p>Traditional security approaches, such as VPNs, often grant broad network access once a user is authenticated. This method assumes that anyone inside the network is trustworthy, a concept known as implicit trust. However, this assumption exposes organizations to significant risks, especially when users connect from unsecured networks or compromised devices. The need for a more granular and secure method of access control has led to the adoption of Zero Trust principles.</p><h4 id="zero-trust-the-foundation-of-secure-access"><strong>Zero Trust: The Foundation of Secure Access</strong></h4><p>InstaSafe&#x2019;s Zero Trust approach is built on the principle of &quot;Never Trust, Always Verify.&quot; Instead of assuming trust based on network location, InstaSafe continuously verifies the identity and context of each access attempt. This model provides several key benefits for securing Microsoft 365:</p><ol><li><strong>Granular Access Controls:</strong> InstaSafe allows organizations to define specific access policies for Microsoft 365 based on user roles, device compliance, and location. This ensures that users can only access the data and applications they need, reducing the attack surface and mitigating the risk of data breaches.</li><li><strong>Continuous Monitoring and Verification:</strong> With InstaSafe, access to Microsoft 365 is continuously monitored. The solution uses machine learning to detect and respond to anomalous behavior, such as unusual login locations or unauthorized device access, allowing IT teams to quickly address potential threats.</li><li><strong>Seamless Integration with Existing Infrastructure:</strong> InstaSafe integrates seamlessly with your existing identity management solutions, such as Azure Active Directory. This integration enables Single Sign-On (SSO) capabilities for Microsoft 365, reducing password fatigue for users while enhancing security through multi-factor authentication (MFA).</li><li><strong>Improved User Experience:</strong> Unlike traditional VPNs, InstaSafe&#x2019;s Zero Trust Solution does not require users to connect to a corporate network to access Microsoft 365. This reduces latency and improves the overall user experience, making it easier for employees to stay productive while working remotely.</li></ol><h4 id="the-instasafe-advantage"><strong>The InstaSafe Advantage</strong></h4><p>By deploying InstaSafe&#x2019;s Zero Trust Solution, organizations can achieve a higher level of security for their Microsoft 365 environment. This solution not only protects against external threats but also addresses the risks posed by insider threats and compromised devices.</p><p>Whether your organization is already using Microsoft 365 or planning to migrate, InstaSafe provides a scalable and flexible solution that can be tailored to meet your specific security needs. By adopting a Zero Trust approach, you can ensure that your critical business applications are protected against the evolving threat landscape.</p>]]></content:encoded></item><item><title><![CDATA[Documentation - Secure Web Gateway]]></title><description><![CDATA[Explore Secure Web Gateway solution, designed to protect your network by filtering web traffic, blocking threats, and ensuring secure access to online resources.]]></description><link>https://instasafe.com/solutions/documentation-secure-web-gateway/</link><guid isPermaLink="false">66a896d67820631ddaf6452d</guid><category><![CDATA[Secure Web Gateway]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Tue, 30 Jul 2024 07:50:42 GMT</pubDate><content:encoded><![CDATA[<h2 id="introduction">Introduction</h2><p>InstaSafe is an RFC 2616 compliant HTTP/1.1 proxy server, specially designed to provide maximum protocol, and payload security.</p><p>InstaSafe based <em>Secure Web Gateways</em> enable your users to safely access the web.InstaSafe, when setup in <em>Reverse Proxy</em> mode, secures your web applications.</p><p>InstaSafe is a highly scalable software, that enables <em>scaling up</em> by increasing the hardware provisioning, or <em>scaling out</em> by creating an application cluster.</p><p>While the installable packages for both these platforms are different for obvious reasons, the configuration and operation is quite identical. So you can choose platform of your choice, to host InstaSafe Proxy Service. Yes, the advantages of deploying InstaSafe on Linux are overall higher because the Linux operating system is better suited for servers. But then if you are more comfortable with Microsoft&#xAE;Windows, you can happily deploy on Windows. Migration from either of the platforms to the other is not very difficult, really!</p><h3 id="system-requisites">&#xA0;System Requisites</h3><p>Use InstaSafe Appliance Builder (IAB) to setup your secure web gateway. SAB is an <em>Ubuntu Linux</em> operating system ISO, customized to provide automatic setup of all the necessary files and services. IAB enables you to transform a <em>standard Intel&#xAE; hardware architecture</em> for servers, into a hardware web security appliance, or a setup a virtual appliance on any virtualization infrastructure like VmWare&#xAE; or Microsoft Hyper-V&#xAE;.</p><p>Use the InstaSafe installation packages (tar.gz) if you wish to setup secure web gateway on other Linux distributions like RedHat&#xAE;, SuSe&#xAE;, CentOS&#xAE;, etc.</p><p>Use Windows installer package to setup InstaSafe on a Microsoft Windows system.</p><p>Note: InstaSafe Secure Web Gateway is powered by SafeSquid</p><h3 id="hardware-requirements">Hardware Requirements</h3><p>Minimal Hardware</p><ul><li>RAM: 4 GB</li><li>CPU: 4 Core</li><li>HDD: 160 GB (Depending upon the number of logs and database you want to keep)</li></ul><p>&#xA0;</p><h3 id="recommended-hardware">Recommended Hardware</h3><p>The above specified Minimal Hardware should enable you to do a functional setup of InstaSafe.</p><p>However provisioning it for active servicing a platform with atleast 8 CPU cores, and 8GB RAM should be a great starting point.</p><p>InstaSafe is SMP-aware, enabling seamless scale-up by increasing CPU cores, RAM and NIC.</p><p>As a thumb rule for server sizing add 2 CPU cores and 4GB RAM per 100 concurrent connections.</p><p>If you intend to use InstaSafe&apos;s HTTPS Inspection feature, using processors with &quot;AES-NI&quot;, is recommended.</p><p><a href="https://www.cyberciti.biz/faq/how-to-find-out-aes-ni-advanced-encryption-enabled-on-linux-system.?ref=instasafe.com">How to find out AES-NI (Advanced Encryption) Enabled on Linux System</a></p><p>InstaSafe is cluster-ready.</p><p>You may thus scale-out by adding nodes to your cluster.</p><p>A clustered setup would give you the advantage of both load&#x2011;balanced throughput as well as high&#x2011;availability service.</p>
<!--kg-card-begin: html-->
<table style="border:none;border-collapse:collapse;"><colgroup><col width="101"><col width="87"><col width="62"><col width="226"><col width="114"></colgroup><tbody><tr style="height:37.5pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#eaecf0;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">CPU (cores)</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#eaecf0;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">RAM (GB)</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#eaecf0;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">HDD</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#eaecf0;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Max Concurrent Connections</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#eaecf0;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Approx Users</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">4</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">8</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">500GB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">100</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">25</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">4</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">16</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">1TB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">500</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">150</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">8</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">16</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">2TB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">1000</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">350</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">8</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">32</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">4TB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">1500</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">600</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">16</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">32</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">4TB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">2000</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">1000</span></p></td></tr><tr style="height:21.75pt"><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">16</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">64</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">8TB</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">3000</span></p></td><td style="border-left:solid #a2a9b1 0.6666667500000001pt;border-right:solid #a2a9b1 0.6666667500000001pt;border-bottom:solid #a2a9b1 0.6666667500000001pt;border-top:solid #a2a9b1 0.6666667500000001pt;vertical-align:top;background-color:#f8f9fa;padding:2pt 5pt 2pt 5pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.38;text-align: center;margin-top:12pt;margin-bottom:12pt;"><span style="font-size:12pt;font-family:Arial,sans-serif;color:#222222;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">1500</span></p></td></tr></tbody></table>
<!--kg-card-end: html-->
<h2 id="installation-and-activation">Installation and Activation</h2><p></p><h2 id="get-product-activation-key">Get Product Activation Key</h2><p>Before downloading the InstaSafe installer(s), you MUST register to create your account on InstaSafe&apos;s self-service portal. Registration is free, and requires just a few minutes. Your registered account also provides the management of InstaSafe&apos;s cloud-backed features, like Custom Web Categorization, VPN support, Configuration Backup, Subscription management, etc.</p><p>All registered users are provided with a Product Activation Key. After the actual installation, you must upload this activation key via InstaSafe&apos;s Browser based Interface. Your users may not be able to access the web until then. Use the same Activation Key across all your instances of InstaSafe, to ensure easy replication of policies, and other common aspects.</p><h3 id="download-installation-package">Download Installation Package</h3><p><strong>InstaSafe Appliance Builder</strong></p><p>InstaSafe Appliance Builder (SAB) is the most recommended installer. You may download it using the link displayed when you log into your registered account. Alternatively you may download it from - https://downloads.InstaSafe.com/appliance/InstaSafe.iso . SAB is a customized version of Ubuntu 18.04 x86_64 minimal iso. You may create a virtual appliance using the SAB iso on any virtualization infrastructure, or boot a standard Intel Server hardware to create a hardware appliance.</p><h3 id="basic-setup">&#xA0;Basic Setup</h3><p>If you plan to use HTTPS inspection, then you must first configure HTTPS inspection</p><p>Integration of InstaSafe Proxy Service with your Microsoft Active Directory, or OpenLDAP service, would be the most recommended immediate next step.</p><p>The How To section could provide you with a fair idea of the rest of the goals that you may want to achieve.</p><p></p><h2 id="how-to-integrate-ad-or-openldap-with-instasafe">How to integrate AD or OpenLDAP with InstaSafe</h2><p></p><h2 id="overview">Overview</h2><p>Active directory information is used to authorize/authenticate the users and computers which are part of your network. Active directory objects are mainly a set of attributes like domain, Organization Unit(OU), user, group, subnet etc. In any Active directory domain controller is responsible for all the authorizations/authentications inside a domain. If any user has access to a domain, he/she can logon from anywhere and any computer in that domain. Active directory Organization unit(OU) can appear only inside a domain and can be used to denote a specific department, location, team, etc. OUs are unique inside a domain. Organization Unit contains objects like users, groups, computers, etc. Active directory user is part of organization and has unique idenity in the domain. Also each user has an unique SID which authorizes user and allow/deny users to access the network resources. Each account is unique and is secured by password.&#xA0;</p><p>Why should we use Active directory services?Active directory services are highly secured they may have layered security which consists of policies and permissions for security at different levels. Objects are usually located anywhere yet can access the domain/network resources securely. Also Active directory services are easily scalable and extensible. Active directory services has easy and efficient mechanism to locate an object. Users can have the same environmental settings immaterial of which computer or location they logon from.</p><p>Why is a proxy based web-gateway integrated to a Microsoft AD or OpenLDAP?</p><p>Network enterprises that have a large number of users, popularly manage user credentials via a centralized system.The centralized system ensures user identification across all the networked enterprise resources and services.Users too benefit immensely, as they need a singular credential to access anything across the network enterprise.</p><p>Microsoft&#x2019;s Active Directory, and OpenLDAP based various Directory Services like Novell&#x2019;s e-Directory are extremely popular for setting up a centralized user identity management systems.Almost all Directory services also offer role, and hierarchy based grouping of users. Most enterprise class networked resources and services also allow control of user access, and rights based on their group membership.</p><p>A proxy-based web gateway is an application layer firewall service that distributes Internet Access to people in the networked enterprise. It is thus essentially a network service.A Web Gateway when integrated to a Directory Service, can:</p><ul><li>Authenticate the users, based on their Directory Service Credentials,</li><li>Control their access to the web depending upon their enterprise role and hierarchy,</li><li>Log and report their activity, in a manner that the HR managers can analyze internet usage individually and of groups of people.</li></ul><h3 id="tutorial-goals">Tutorial Goals</h3><p>In this tutorial you will see how to integrate your Microsoft Active Directory or OpenLDAP service to a proxy server easily.With the use of InstaSafe SWG WebGUI it is easy to perform the necessary integration process, you can create the policies to control access, and validate the success.</p><p>At the end we will inspect InstaSafe&#x2019;s logs to inspect how the internet usage of any user identified via the Directory Service, is recorded for the purpose of analytics.InstaSafe can be integrated to the Microsoft Active Directory for SSO/Kerberos based user identification. The additional steps required for Kerberos configuration are discussed in another tutorial.</p><h2 id="prerequisites">Prerequisites</h2><p>Collect the following information before starting integration&#xA0;</p><ul><li>LDAP Server Fully Qualified Domain Name ( FQDN ) and IP address.</li><li>LDAP Administrator User name and Password.(You can provide any user from LDAP server who has administrator rights)</li><li>LDAP Server Basedn</li><li>LDAP Server Domain name</li></ul><p>Note :&#xA0;</p><ul><li>Add InstaSafe server DNS entry in your Active Directory Server</li><li>Make sure that your AD Domain must be resolvable from all clients and InstaSafe Server.&#xA0;</li></ul><h2 id="integration-of-microsoft-active-directory">Integration of Microsoft Active Directory</h2><p>Integration of Active Directory include the following types of Authentication.&#xA0;</p><h3 id="simple-authentication">Simple Authentication</h3><p>Simple authentication is a type of interactive authentication to the user. If you configure simple authentication the user will be prompted for credentials for every new session opened.&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><h3 id="sso-authentication">SSO Authentication&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</h3><p>SSO authentication is a type of non-interactive authentication to the user. In SSO authentication once the user logged into his/her system then that credentials will be used for all sessions opened by that user.</p><h3 id="preferred-linux-distribution-setup-your-secure-web-gateway-on-your-preferred-linux-distribution">Preferred Linux distribution: Setup Your Secure Web Gateway on your preferred Linux distribution</h3><p>InstaSafe Appliance Builder (SAB) is an optimized version of Ubuntu Linux, optimized for easy setup of your secure web gateway. The SAB installs the Ubuntu Linux operating system, downloads and deploys the InstaSafe for Linux installation package, and the necessary dependencies. InstaSafe can also be installed on any other Linux operating system like Red-Hat, SuSe, CentOS, etc.</p><h3 id="how-to-setup-virtualization-environment-for-instasafe-with-virtualbox">How to setup virtualization environment for InstaSafe with VirtualBox.</h3><p>VirtualBox is a powerful x86 and AMD64/Intel64 Virtualization Product. It can be used for Enterprise as well as for personal use. It is freely available and is an Open Source Software. It&#xA0; runs on windows, Linux, Macintosh and Solar Host.</p><h3 id="setup-https-inspection">Setup HTTPS Inspection</h3><p>HTTPS Inspection is the standard Security technology for encrypting a connection between the client and web server. Enable HTTPS inspection on InstaSafe SWG to inspect HTTPS traffic that is encrypted by the Secure Sockets Layer (SSL) protocol. InstaSafe will do deep content inspection of encrypted HTTPS traffic. Further this encrypted content can be filtered easily.</p><h3 id="integrate-a-linux-host-with-a-windows-ad-for-kerberos-sso-authentication">Integrate a Linux Host with a Windows AD for Kerberos SSO authentication</h3><p>Kerberos Authentication support is particularly useful for Enterprise networks that have a Microsoft AD based Domain controller. By properly configuring the necessary Kerberos related factors, your enterprise Internet users can optionally enjoy Windows Integrated Authentication. Windows Integrated Authentication is a non-interactive authentication process, that uses SSO authentication. SSO ensures that your users do not have to manually provide their user credentials as username / password to access your networked enterprise resources and services, yet their access is restricted as specified. SSO, thus not only just adds convenience to the overall user experience, but also enhances security.</p><h2 id="block-personal-gmail-and-allow-google-corporate-accounts">Block Personal Gmail And Allow Google Corporate Accounts</h2><p>Block Personal Gmail to ensure Data Security. No sharing of confidential data with personal accounts.You may want to prevent users from signing into Google services using any accounts other than the accounts you provided them with.Auto logout when detected that user is logged into personal Gmail. You can setup InstaSafe to block the access to consumer Google accounts.</p><h2 id="data-leakage-prevention">Data Leakage Prevention</h2><h3 id="controlling-uploads">Controlling Uploads</h3><p>DLP module is primarily used to restrict/prevent uploads of confidential and critical information from any organization. You can select predefined content type(s) in DLP section to prevent their upload(s). You can create multiple policies in DLP section such that all the selected content types will be blocked when any end user tries to upload it.</p><h3 id="block-virus-uploads-and-downloads">Block Virus Uploads And Downloads</h3><p>Protect your network against viruses, Trojans, malware and other threats. You can block virus uploads and downloads by using InstaSafe. InstaSafe is providing different types of antivirus setups.&#xA0;</p><h2 id="block-anonymous-proxies">Block Anonymous Proxies</h2><p>An anonymous proxy will allow your users to surf the web anonymously, since it tunnels your data through servers that are spread out across the globe and involve other IP addresses. Anonymous Proxy service enhances your security and lets your users access some restricted websites online. You can block these proxies by using InstaSafe, so that no user access the blocked websites</p><h3 id="block-advertisements-and-banners">Block Advertisements And Banners</h3><p>Security was the main reason cited for blocking of Advertisements. Advertisements can be annoying or intrusive. Blocking of advertisements can result in quicker loading and cleaner looking web pages with fewer distractions, lower resource waste (bandwidth, CPU, memory, etc.). You can setup InstaSafe to block all types of annoying advertisements and banners.</p><h2 id="block-third-party-cookies">Block Third Party Cookies</h2><p>You can block the cookies for third-party domains. Control tracking your activity across different sites and you can hide the referer for third-party domains. Now referer is same as hostname. You can also hide the user agents for third-party domains. Instead of original user agent InstaSafe use default user agent. (Mozilla/4.0 (compatible; MSIE 5.5; Windows 98; Win 9x 4.90)).</p><h2 id="block-particular-user-login-to-facebook-or-gmail">Block Particular User Login To Facebook Or Gmail</h2><p>Restrict selective login user-names of logins from Facebook Or Gmail. You just enable default rule and modify your respective username with default ones. Now except selected users all can able to login into Facebook or Gmail.</p><h2 id="profiled-internet-access">Profiled Internet Access</h2><p>Your secure web gateway serves a variety of users, and applications. Appropriate restrictions ensure the web access boosts efficiency, while curbing non-productive activities. InstaSafe enables you to define policies as <em>access profiles</em>, and ensure compliance. Create policies for users, based on their organizational hierarchy, and business role, to boost productivity.</p><h2 id="enforce-safe-searches-on-gateway">Enforce Safe Searches On Gateway&#xA0;</h2><p>World Wide Web provide extensive knowledge on almost every topic that you can think. Due to the vast information scattered around on the web we sometimes find the content that are irrelevant and inappropriate. We often come across adult/porn content accidentally while we are trying to find some information over internet. This may be faced by children or by someone who isn&apos;t supposed to watch pornographic content. Search engines help us big time in searching the appropriate content, but can sometimes mislead us. To avoid this Search engines has started providing with an additional feature Safe-Search.You can setup Safe Searches for different search engines like Google, Yahoo, Bing&#xA0; by using InstaSafe.</p><p></p><h2 id="faqs"><strong>FAQs</strong></h2><h3 id="what-is-instasafe-swg"><strong>What is InstaSafe SWG?</strong></h3><p>InstaSafe is an RFC 2616 compliant HTTP/1.1 proxy server, specially designed to provide maximum protocol, and payload security.</p><p>InstaSafe based Secure Web Gateways enable your users to safely access the web.</p><p>InstaSafe, when setup in Reverse Proxy mode, secures your web applications.</p><p>InstaSafe is a highly scalable software, that enables scaling up by increasing the hardware provisioning, or scaling out by creating an application cluster.</p><h3 id="why-should-i-use-instasafe"><strong>Why should I use InstaSafe?</strong></h3><p>InstaSafe is an HTTP Proxy Server specially designed for web security. You should use InstaSafe for securely distributing Internet access across large network and to protect your enterprise against productivity losses, and collateral losses.</p><h3 id="which-operating-systems-does-instasafe-support"><strong>Which Operating Systems does InstaSafe support?</strong></h3><p>InstaSafe support both operating systems, i.e. LINUX as well as Microsoft Windows.</p><p>The installable packages for both these platforms (LINUX and Microsoft Windows) are different for obvious reasons, the configuration and operation is quite identical. So, you can choose platform of your choice, to host InstaSafe Proxy Service.</p><p>Yes, the advantages of deploying InstaSafe on Linux are overall higher because the Linux operating system is better suited for servers. But then if you are more comfortable with Microsoft&#xAE;Windows, you can happily deploy on Windows. Migration from either of the platforms to the other is not very difficult, really!</p><h3 id="what-is-the-minimal-hardware-required-for-instasafe"><strong>What is the minimal hardware required for InstaSafe?</strong></h3><p>RAM: 4 GB</p><p>CPU: 2 Core</p><p>HDD: 160 GB (Depending on the size of logs and database you want to store)</p><p>See the Hardware Requirements here - Hardware requirements</p><h3 id="what-is-instasafe-appliance-builder"><strong>What is InstaSafe Appliance Builder?</strong></h3><p>InstaSafe Appliance Builder (IAB) is the most recommended method for setting up your secure web gateway. IAB is a customized distro of Ubuntu Linux. It enables you to quickly setup your secure web gateway on a standard Intel server hardware, or as a virtual appliance on any virtualization platform like VMware or Hyper-V.</p><p>IAB automatically installs and configures all dependency libraries, and services.</p><h3 id="where-should-i-get-the-latest-version-of-instasafe-to-upgrade"><strong>Where should I get the latest version of InstaSafe to upgrade?</strong></h3><p>You can download <strong>InstaSafe SWG for Windows</strong> package from - http://downloads.InstaSafe.net/SWG/windows/setup_InstaSafe_swg_latest.exe</p><p>You can download <strong>InstaSafe SWG for Linux</strong> package from - http://downloads.InstaSafe.net/appliance/binary/InstaSafe_latest.tar.gz</p><h3 id="what-is-instasafe-for-windows"><strong>What is InstaSafe for Windows?</strong></h3><p>InstaSafe for Windows is content filtering proxy server. InstaSafe for Linux has been natively ported for use on Microsoft Windows platform, and distributed as InstaSafe for Windows. It gives you Total Access Control, Total Content Control &amp; Total Internet Security. InstaSafe for Windows can be installed on any desktop/server having Microsoft Windows based 64-bit Operating Systems.</p><h3 id="where-should-i-get-a-product-activation-key"><strong>Where should I get a product activation key?</strong></h3><p>You can get a product activation key <strong>on InstaSafe self-service portal</strong> - https://key.InstaSafe.com/</p><p>You must register to create your account on <strong>InstaSafe self-service portal</strong> and <strong>download your product activation key</strong></p><h3 id="what-is-instasafe-self-service-portal"><strong>What is InstaSafe Self Service portal?</strong></h3><p>The InstaSafe Self-Service Portal is the cloud-based management console for InstaSafe.</p><p>The InstaSafe Self-Service Portal manages the activities like, InstaSafe cloud-backed features, Custom Web Categorization, Web Security Clients for Roaming users (VPN), Confidential Data Signatures, Subscription management, etc.</p><p>Read more about Management of Self-Service Portal</p><h3 id="whom-should-we-permit-to-access-the-instasafe-web-gui"><strong>Whom should we permit to access the InstaSafe Web GUI?</strong></h3><p>InstaSafe has an intrinsic Web GUI, that enable you to manage your installation, setup required policies, and monitor your secure web gateway.</p><p>You should configure InstaSafe policies to allow access of the Web GUI to only security administrators.</p><h3 id="how-do-i-know-instasafe-product-is-activated"><strong>How do I know InstaSafe product is activated?</strong></h3><p>If you able to access all the websites from your browser that means your product is activated.</p><h3 id="where-should-i-get-license-details"><strong>Where should I get license details?</strong></h3><p>Once you activate product successfully you should get license details on Support page of InstaSafe Web GUI.</p><p>For more details follow- LINK</p><h3 id="why-am-i-getting-proxy-access-denied"><strong>Why am I getting &quot;Proxy Access Denied?&quot;</strong></h3><p>If you should not properly configure policies under access restriction section or administrator should not give you access of InstaSafe Interface, you are getting &quot;Proxy Access Denied&quot; template.</p><h3 id="does-instasafe-inspect-https-traffic"><strong>Does InstaSafe inspect HTTPS traffic?</strong></h3><p>Yes of course, InstaSafe inspect HTTPS traffic.</p><p>HTTPS Inspection is the standard Security technology for encrypting a connection between the client and web server.</p><h3 id="when-should-i-enable-https-inspection"><strong>When should I enable HTTPS Inspection?</strong></h3><p>Enable HTTPS inspection on InstaSafe SWG to inspect traffic that encrypted by the Secure Sockets Layer (SSL) protocol. By that InstaSafe do deep content inspection of encrypted HTTPS traffic. Encrypted content filtered easily.</p><h3 id="when-should-i-bypass-https-inspection"><strong>When should I bypass HTTPS Inspection?</strong></h3><p>The HTTPS inspection Bypass option enables you to define specific websites that are not subject to decryption as they flow through the proxy.</p><p>Some websites may include personal identification information that should not be decrypt.</p><p>To avoid liability for inspecting this type of information, you may want to specify some or all these sites for decryption bypass.</p><p>The selected sites will not be decrypt even if the category or categories that the sites belong to selected for SSL analysis.</p><h3 id="what-are-the-benefits-of-https-inspection-in-instasafe"><strong>What are the benefits of HTTPS inspection in InstaSafe?</strong></h3><p>Having HTTPS inspection feature some interesting things that you can do with this InstaSafe SWG</p><p>You should block access to personal Google accounts.</p><p>You should give Read only access to the Facebook, Twitter sites. Users can able to login into their accounts but they cannot able to do post or comment or like or chat.</p><p>You should enforce safe search or safety mode-based searches in Google, Bing and Yahoo search engines and also, we can enforce in any websites that are offering safety mode-based search.</p><p>You should block images over Google&#xA0;&#xA0;</p><p>You should filter text, Images over HTTP, and HTTPS sites</p><p>You should allow specified users to access or to login into specified HTTP and HTTPS sites and block others</p><p>You should use Virus scanning for both HTTP and HTTPS sites?</p><p>You should block attachments to Gmail and Block Gmail Chat</p><h3 id="what-is-an-ssl-certificate"><strong>What is an SSL certificate?</strong></h3><p>SSL Certificates are small data files that digitally bind a cryptographic key to an organization&#x2019;s details.</p><p>When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser.</p><p>SSL Certificates provide secure, encrypted communications between a website and an internet browser.</p><p>SSL stands for Secure Sockets Layer, the protocol which provides the encryption.</p><p>SSL Certificates installed on pages that require end-users to submit sensitive information over the internet like credit card details or passwords.</p><h3 id="where-can-i-get-an-ssl-certificate"><strong>Where can I get an SSL certificate?</strong></h3><p>You should get SSL certificate on <strong>InstaSafe self-service portal</strong> at - https://www.InstaSafe.com/</p><p>You can generate new self-signed certificate also.</p><p>Follow - LINK</p><h3 id="can-i-use-my-ssl-certificates-generated-from-my-enterprise-ca"><strong>Can I use my SSL certificates generated from my Enterprise CA?</strong></h3><p>Yes, you can use your SSL certificate generated from you Enterprise CA if you have. InstaSafe provides you a facility to use SSL certificate generated from Enterprise CA.</p><h3 id="can-i-integrate-an-ldap-service-like-microsoft-active-directory-or-openldap-with-instasafe"><strong>Can I integrate an LDAP service like Microsoft Active Directory or OpenLDAP with InstaSafe?</strong></h3><p>Yes, you can integrate an LDAP service like Microsoft Active Directory or OpenLDAP with InstaSafe if your network enterprises that many users have, popularly manage user credentials via a centralized system.</p><p>Microsoft&#x2019;s Active Directory, and OpenLDAP based various Directory Services are extremely popular for setting up a centralized user identity management system.</p><p>A Web Gateway when integrated to a Directory Service, can:</p><p>Authenticate the users, based on their Directory Service Credentials,</p><p>Control their access to the web depending upon their enterprise role and hierarchy,</p><p>Log and report their activity, in a manner that the HR managers can analyses internet usage individually and of groups of people.</p><h3 id="what-is-instasafe-sso-authentication"><strong>What is InstaSafe SSO Authentication?</strong></h3><p>InstaSafe SSO authentication is non-interactive authentication process.</p><p>InstaSafe SSO Authentication support is particularly useful for Enterprise networks that have a Microsoft AD based Domain controller.</p><p>By properly configuring the necessary Kerberos related factors with InstaSafe, your enterprise Internet users can enjoy SSO Authentication.</p><p>InstaSafe SSO authentication ensures that your users do not have to manually provide their user credentials as username / password to access your networked enterprise resources and services, yet their access restricted as specified. InstaSafe SSO authentication, thus not only just adds convenience to the overall user experience, but also enhances security.</p><h3 id="if-my-sso-authentication-fails-is-ldap-fail-over-functionality-available-in-instasafe"><strong>If my SSO authentication fails is LDAP fail over functionality available in InstaSafe?</strong></h3><p>If user unable to get access for network enterprise in case, user should not face any problem of authentication because InstaSafe gives you a fantastic functionality known as LDAP fail-over.</p><p>If user face any issue while SSO authentication he/she should give LDAP valid credentials i.e. Username and Password.&#xA0;</p><p>Once username and password validated user should get access for network enterprise.</p><h3 id="when-should-i-bypass-authentication"><strong>When should I bypass authentication?</strong></h3><p>Certain applications (like Dropbox) which does not support proxy authentication, they want to bypass authentication for that application.</p><h3 id="can-i-use-instasafe-captive-portal-to-monitor-internet-usage-traffic"><strong>Can I use InstaSafe Captive portal to monitor internet usage traffic?</strong></h3><p>Yes, you can use InstaSafe captive portal to monitor internet usage traffic.</p><h3 id="what-is-instasafe-captive-portal"><strong>What is InstaSafe Captive portal?</strong></h3><p>InstaSafe captive portal is works as same as general captive portal.</p><p>Used to enhance security of WIFI network by authenticating users before granting internet access.</p><p>Users will receive InstaSafe captive portal landing page when they try to access internet access via WIFI network. Users will punch in credentials.</p><p>InstaSafe captive portal validates user credentials using various authentication mechanisms and maintains database of authenticated source IP addresses and usernames for lookup.</p><p>If a user from a source IP address authenticated through captive portal, then InstaSafe will pick the username from the database and attach to the traffic coming from the same source IP address</p><p>This way InstaSafe captive portal secures WIFI network by only granting access to valid users</p><p>Combining InstaSafe Captive Portal with InstaSafe secure web gateway will allow you to monitor internet usage, allow you to filter traffic and do many more things to enhance security levels.</p><h3 id="does-instasafe-supports-transparent-proxy"><strong>Does InstaSafe supports transparent proxy?</strong></h3><p>Yes, InstaSafe supports transparent proxy.</p><p>InstaSafe support both HTTP and HTTPS websites in transparent mode. The HTTPS websites in transparent mode called as SSL transparent proxy</p><p>The traffic will come to router and router will send traffic to InstaSafe Secure web gate way with port 80 and 443 respectively.</p><p>The <strong>redirection rules on InstaSafe Secure web gateway</strong> will redirect traffic to InstaSafe Proxy with port 8080 and 8443 (SSL transparent) respectively (By enabling IP forwarding).</p><h1 id></h1><h3 id="why-should-i-enable-wccp"><strong>Why should I enable WCCP?</strong></h3><p>If you are looking for transparent redirection of traffic, Load balance traffic &amp; scaling up or Service assurance &amp; high availability, you should enable WCCP in InstaSafe</p><p>Enable WCCP support in routers. This can be done only if your router supports WCCP.</p><p>Ex: CISCO ASA routers.</p><p>Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing protocol that provides a mechanism to redirect traffic flows in real-time. It has built-in load balancing, scaling, fault tolerance, and service-assurance (failsafe) mechanisms.</p><h3 id="can-i-prevent-user-to-access-social-networking-sites"><strong>Can I prevent user to access Social networking sites?</strong></h3><p>Yes, you can prevents users from accessing Social networking sites using InstaSafe.</p><p>If you configured InstaSafe, will block all social networking sites by default.</p><p>You can allow those sites for specific time say in between LUNCH hour.</p><p>Facebook is a social networking website that allows users to interact with other users in a multimedia environment on the Web. Facebook users can install and use applications to enhance their experience. Many organizations want to allow Facebook access to maintain morale, increase retention, and boost hiring, but they also want to control access to it.</p><p>InstaSafe allows you to give full Facebook access to your social media group, partial access to a customer service group, and read-only access to other groups. Access to Facebook can also assigned by time of day, so permissions could relax during lunch or after business hours. For more details follow - LINK</p><h3 id="can-i-prevent-users-to-upload-confidential-data"><strong>Can I prevent users to upload confidential data?</strong></h3><p>Yes, you can prevents users from uploading confidential data using InstaSafe.</p><p>When you have confidential information in your organization and someone from internal users just leaked the information intentionally or unintentionally, then what will happen? Huge productivity loss.</p><p>There are various mediums for data leakage. Users can upload important document to internet, even though your content filtering software does not allow users to upload Microsoft Word and Microsoft XL files, users can act smart and creates an archive using those files and tries to upload achieved files. You cannot simply block archives in your organization because there are people who simply use archive to transfer log files of large sizes.</p><p>There are other users who simply take information out of Microsoft Word and Microsoft XL and simply send an Email to third party.</p><p>In modern era, these kind of data leaks become a challenge for organizations. Organizations are in a quest for content filtering software&#x2019;s which can deeply inspect archive files and able to identify whether the archive or emails which contains certain keyword matches.</p><p>This challenge is also big for security experts because when there is an upload the post data formation is different for Gmail / Google Drive/ Media fire/ Drobox etc. The wide range of formations of post data made it difficult for security experts to derive concrete solution to these challenges.</p><p>But InstaSafe come up with <strong>Advanced DLP</strong> solution embedded into <strong>InstaSafe SWG</strong>, which analyses post data, deeply inspect archives using file decomposition methods and able to identify whether archive or emails or social media posts contains certain keyword matches. Based on the match you can take effective actions like block upload if user is so and so or block if the destination website is so and so.&#xA0;&#xA0;</p><p>The Advanced DLP solution can managed from InstaSafe Self Service portal there you can create various keyword expression matches. InstaSafe SWG will download those keyword expressions and loads into memory. When an archive uploads or an email write, InstaSafe SWG analyses Post data and transmit it to the Clam AV daemon for Signatures verification. If the keyword expression matches Clam AV daemon responds with match. InstaSafe will take respective action based on match.</p><h3 id="can-i-prevent-users-to-upload-specific-file-extensions"><strong>Can I prevent users to upload specific file extensions?</strong></h3><p>Yes you can prevent users from uploading specific file extensions using InstaSafe.</p><p>InstaSafe DLP section is nothing but <strong>Data Loss Prevention module</strong>, used to protect from sending sensitive or critical information outside the corporate network.</p><p>It is possible by blocking the specific file types or file extensions based on Content type and extension of file types.</p><p>For more information follow - How to block file uploads or downloads</p><h3 id="can-i-prevent-users-to-use-anonymous-proxy"><strong>Can I prevent users to use anonymous proxy?</strong></h3><p>Yes you can prevent users from using anonymous proxy using InstaSafe.</p><p>An anonymous proxy will allow users to surf the web anonymously, since it tunnels your data through servers that spread out across the globe and involve other IP addresses.</p><p>Anonymous Proxy service enhances your security and lets your users access some restricted websites online.</p><p>InstaSafe block these proxies so that no user can access the blocked websites.</p><p>For more detail follow &#x2013; How to block anonymous proxies</p><h3 id="can-i-prevent-users-to-use-their-personal-gmail-account-in-company-network"><strong>Can I prevent users to use their personal Gmail account in company network?</strong></h3><p>Yes, you can prevent users from using their personal Gmail account in company network using InstaSafe.</p><p>Currently e-mails are necessary to exchange information. But allowing personal e-mails in the office network allows users to spend their productive time in other unnecessary things. Personal mails can be also a path leading to send confidential information. Blocking personal mails, solves the issue. But now some of the company mails are via Google Corporate domains.</p><p>Google corporate account allows organization to have their mailing server along with the additional Gmail features personalized for the organization with complete control. So, we currently cannot block Gmail.</p><h3 id="can-i-prevent-user-to-login-over-facebook-or-gmail"><strong>Can I prevent user to login over Facebook or Gmail?</strong></h3><p>InstaSafe restrict specific users from login over Facebook or Gmail.</p><p>Except selected users all can able to login into Facebook or Gmail.</p><h3 id="does-instasafe-protect-network-against-malware-and-external-attacks"><strong>Does InstaSafe protect network against Malware and External Attacks?</strong></h3><p>InstaSafe protect network against Malware and External attacks. There are numerous ways to protect and remove malware from our computers.No one method is enough to ensure your computer is secure. The more layers of D&#xE9;fense, the harder for hackers to use your computer.</p><h3 id="should-i-block-third-party-cookie"><strong>Should I block third party cookie?</strong></h3><p>InstaSafe block the cookies for third-party domains.</p><p>Control tracking your activity across different sites and hide the referrer for third-party domains. InstaSafe provides you a great functionality. Now referrer is same as hostname.</p><p>You can also hide the user agents for third-party domains, instead of original user agent. InstaSafe use default user agent (Mozilla/4.0 (compatible; MSIE 5.5; Windows 98; Win 9x 4.90)).</p><p>For more details - How to block third party cookies</p><h3 id="where-should-i-get-instasafe-default-policies"><strong>Where should I get InstaSafe default policies?</strong></h3><p>You should get InstaSafe default policies and it&apos;s respective how to on &quot;How To&quot; section of http://docs.InstaSafe.com</p><h3 id="should-i-get-performance-plot-in-instasafe"><strong>Should I get performance plot in InstaSafe?</strong></h3><p>You should get performance plot on support page of InstaSafe Web GUI. You can generate performance plot as per your choice. InstaSafe gives you choice according to Last hour, last 7 days, last month, today InstaSafe also gives you choice to select custom time.</p><h3 id="should-i-get-support-tarball-in-instasafe"><strong>Should I get support tarball in InstaSafe?</strong></h3><p>You should get support tar-ball on support page of InstaSafe Web GUI. You can generate new support tar-ball. You can search support tar-ball from existing list according to year, month, day, or time</p><h3 id="should-i-download-my-config-file"><strong>Should I download my config file?</strong></h3><p>You should download your config file any time. InstaSafe gives you choice to download config file according to year, month, day, or time. InstaSafe also gives you choice to download default config file in case you should have to revert the config file.</p><h3 id="is-instasafe-provide-dashboard-for-reporting"><strong>Is InstaSafe provide dashboard for reporting?</strong></h3><p>InstaSafe provide dashboard which contain details of last 1000 transactions. InstaSafe dashboard provides Ip address, Users, User groups, websites domains, profiles, application signature, categories, upload content, download content, User can edit total number of transactions as per the requirement for report. User also gets report based on date range. Use can select any number of filtering option.</p><h3 id="should-i-get-report-in-pdf-format"><strong>Should I get report in PDF format?</strong></h3><p>InstaSafe reporting model gives you exportable reports to PDF and Excel formats.&#xA0; To get report you have to access InstaSafe interface and click on Reports &gt; Dashboard. At right bottom you should get PDF button just above the InstaSafe version.</p><h3 id="can-i-get-report-of-specific-dates"><strong>Can I get report of specific dates?</strong></h3><p>Yes, InstaSafe has reporting model. InstaSafe reporting model reduced data Processing time. InstaSafe reporting model gives you more detailed reports. InstaSafe reporting model gives you hour-wise reports. InstaSafe reporting model gives you more filtering options. InstaSafe reporting model gives you deeper data analysis. InstaSafe reporting model gives you an automated data mining engine. InstaSafe reporting model gives you exportable reports to PDF and Excel formats. My InstaSafe becomes very slow after it has been running for some time? Why?</p><h3 id="how-does-instasafe-licensing-work"><strong>How does InstaSafe licensing work?</strong></h3><p>InstaSafe SWG is available with annual subscription. Base Subscription Plans</p><p>You may choose any one of the following Base Subscription plans:</p><p>Named Users</p><p>Concurrent Connections</p><p>CPU Hours</p><p>Named Users, and Concurrent Connection based subscriptions are annual subscriptions. You may however purchase for multiple consecutive years.</p><p>Premium Features Subscription</p><p>Data Leakage Prevention</p><p>Support for Roaming (Windows Laptop) users</p><p>Log Aggregator</p><p>WCCP</p><p>For more details Follow - InstaSafe licensing</p><h3 id="how-do-i-purchase-instasafe-secure-web-gateway"><strong>How do I purchase InstaSafe secure web gateway?</strong></h3><p>You can opt for InstaSafe SWG subscription by paying online via PayPal or via Wire / Bank Transfer.</p><h3 id="what-happens-if-i-stop-paying-instasafe-for-my-subscriptions"><strong>What happens if I stop paying InstaSafe for my subscription(s)?</strong></h3><p>As InstaSafe SWG is available as annual subscription, if you do not renew your subscription the product will stop working.</p><p></p>]]></content:encoded></item><item><title><![CDATA[InstaSafe Secure Web Gateway]]></title><description><![CDATA[InstaSafe Cloud Web Security provides users with a safe and secure Internet access experience, protected from threats and malware.  InstaSafe provides your organization with a versatile and flexible Web security platform – enabling you to protect your users anywhere and on any Web-capable device]]></description><link>https://instasafe.com/solutions/instasafe-secure-web-gateway/</link><guid isPermaLink="false">66a1f44b7820631ddaf644de</guid><category><![CDATA[Secure Web Gateway]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Thu, 25 Jul 2024 07:12:55 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/07/SWG.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/07/SWG.png" alt="InstaSafe Secure Web Gateway"><p>InstaSafe Cloud Web Security provides users with a safe and secure Internet access experience, protected from threats and malware. Now IT Security organizations can now instantly create and deploy, without the need for any hardware or software to buy with no maintenance or upgrade.</p><p>There are many advantages of InstaSafe Cloud Web Security (CWS). InstaSafe provides your organization with a versatile and flexible Web security platform &#x2013; enabling you to protect your users anywhere and on any Web-capable device. As a<br>hosted solution, InstaSafe enables considerable advantages over traditional in-house security solutions:</p><ul><li>Instant Deployment &#x2013; connect to the service and you&#x2019;re immediately up and running. </li><li>No Upfront Expenditure &#x2013; no need to purchase capital and no obsolete hardware. </li><li>Predictable Costs To Suit Any Organization &#x2013; InstaSafe CWS has<br>a subscription fee, instead of upfront costs, making security affordable to organizations of all sizes. </li><li>Enterprise-Class Security &#x2013; you gain the benefit of top email and Web security infrastructure thanks to economies of scale.</li><li>The Experts Work For You &#x2013; your email traffic is managed 24/7 by Internet security experts and modelled against other networks to detect traffic anomalies.</li><li>Save Bandwidth And Resources &#x2013; control access to bandwidth heavy sites and applications such as YouTube which our research has shown to consume 75%-90% of most typical organization&#x2019;s bandwidth.</li><li>Strength In Numbers &#x2013; you gain the shared benefits of being part of<br>a larger security community.</li><li>Zero Administration - No tedious upgrades, no maintenance requirements; you always have the latest and best protection.</li></ul><p>InstaSafe Web Security enables comprehensive security yet is simple<br>and easy to use. Our services target a range of Web-based threats and<br>security concerns.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2024/07/Citrix-Modified-Diagram--1-.png" class="kg-image" alt="InstaSafe Secure Web Gateway" loading="lazy" width="2000" height="1420" srcset="https://instasafe.com/solutions/content/images/size/w600/2024/07/Citrix-Modified-Diagram--1-.png 600w, https://instasafe.com/solutions/content/images/size/w1000/2024/07/Citrix-Modified-Diagram--1-.png 1000w, https://instasafe.com/solutions/content/images/size/w1600/2024/07/Citrix-Modified-Diagram--1-.png 1600w, https://instasafe.com/solutions/content/images/2024/07/Citrix-Modified-Diagram--1-.png 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">InstaSafe Cloud Web Security - Block Diagram</span></figcaption></figure><h2 id="key-features-of-instasafe-cloud-web-security-includes"><strong>Key Features of InstaSafe Cloud Web Security Includes</strong></h2><ul><li>Mobile Security &#x2013; InstaSafe Web Security is cloud- based, protection and policies can be applied to your users anywhere and on any device, in<br>the office, on the road or at home / on a laptop or workstation.</li><li>URL Filtering &#x2013; utilizing a layered approach, the service employs the latest<br>range of Web filtering technologies including real-time content analysis and behavioral modelling in conjunction with over 50 constantly updated categories of millions of websites to enable you to control access to related Web content.</li><li>Anti-Virus &amp; Malware &#x2013; the service incorporates traditional anti-virus technology, sophisticated dynamic anomaly detection and behavioral modelling systems to protect your organization from viruses, botnets, spyware, browser exploits and other Web 2.0 threats. </li><li>Application Control &#x2013; gain control over popular Web 2.0 applications such as Social Networking, Streaming Media and Web-based messaging.</li><li>Bandwidth Control &#x2013; manage your Internet bandwidth consumption and control unnecessary or non-business use. With flexible, policy-based control you can place restrictions on specific users or at particular times of day when you need to ensure you are getting the most from your bandwidth.</li><li>Inbound &amp; Outbound Policy Compliance &#x2013; actively monitor your<br>acceptable use policies and ensure appropriate use of Web resources, block inappropriate conduct and prohibited content which could potentially create legal liability risk and ensure a safe and productive workplace for your employees. </li><li>Security &amp; Compliance Reporting &#x2013; access useful and easy to understand reports on your Internet activity and threats. Graphical summaries are provided as well as in-depth reports to help you investigate specific events or user activity. You can run reports by site, category, user, and bandwidth and by<br>threat type across a wide range of time periods.</li><li>Directory Synchronization &#x2013; InstaSafe provides automated user account directory synchronization to streamline administration and save you time and<br>effort. InstaSafe supports all common directory formats including Active Directory and LDAP.</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2024/07/image-1.png" class="kg-image" alt="InstaSafe Secure Web Gateway" loading="lazy" width="696" height="877" srcset="https://instasafe.com/solutions/content/images/size/w600/2024/07/image-1.png 600w, https://instasafe.com/solutions/content/images/2024/07/image-1.png 696w"><figcaption><span style="white-space: pre-wrap;">InstaSafe Cloud Web Security Features and Capabilities</span></figcaption></figure><h2 id="advantages-of-instasafe-cloud-web-security">Advantages of InstaSafe Cloud Web Security</h2><ul><li>Malware Protection: Malware are the bane of any organisation with the potential to wreak havoc in your infrastructure. InstaSafe CWS works on<br>sophisticated algorithms to dynamically detect any anomalies, inspect the files and model traffic over the net to protect your organisation from viruses, botnets, spyware, browser exploits and other advanced threats.</li><li>Off- Network Protection: With an increase in remote mobile workers accessing from different parts of the globe on open networks, it is imperative to secure the users and devices beyond the network perimeter. Instasafe CWS offers complete security for all users and their devices outside of the perimeter in a simplest and cost effective manner.</li><li>Compliance Enforcement: Compliance to corporate browsing policy is essential to ensure a productive workforce. With Instasafe CWS, it becomes extremely simple and easy to not just define and enforce content and browsing user  policies but also get alerts on non compliance and ability to do forensic  compliance analysis.</li><li>Data Leakage Prevention: Unintentional data leakage of confidential information is the weakest link in an organisation&#x2019;s security. Instasafe CWS helps you with policies to control sharing of confidential information over the<br>network thereby helping you with compliance to data security regulations and policies.</li></ul><h2 id="benefits-of-instasafe-cloud-web-security">Benefits of InstaSafe Cloud Web Security</h2><ul><li>Plug and Play: Connect to the service in just 5 steps. Instantly up and running</li><li>No Capex, Only Opex: No upfront investment in expensive or obsolete hardware</li><li>Predictable Costs: Pay-as-you-grow. InstaSafe CWS is a subscription based service so you exactly know how much to pay and when.</li><li>Enterprise Class Security: Economies of scale coupled with top class security initiatives irrespective of organization size.</li><li>Cost Savings: Save on bandwidth by controlling access to heavy sites and applications like Youtube and streaming apps which consume 70% -90% of your bandwidth</li><li>Zero Administration: No Upgrades. No patches. No maintenance. Just connect and stay updated with the latest at all times</li><li>Expert Involvement: 24/7 email traffic management by security experts constantly modelled against other networks to detect anamolies. </li></ul><h3 id="customer-testimonial">Customer Testimonial</h3><p>&quot;InstaSafe Cloud based Web Security is the simplest and most cost effective way to protect my data and devices from digital threats, whether on-network or off&quot; -  Satyajit Sarkar, GM IT, DTDC Cargo and Courier</p>]]></content:encoded></item><item><title><![CDATA[Website Traffic Filtering]]></title><description><![CDATA[Enhance security and productivity with our Secure Web Gateway's Website Traffic Filtering. Protect against threats, improve compliance, and optimize web access. Request a free demo today!]]></description><link>https://instasafe.com/solutions/website-traffic-filtering/</link><guid isPermaLink="false">66a0ca3a7820631ddaf644cc</guid><category><![CDATA[Secure Web Gateway]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 24 Jul 2024 09:33:38 GMT</pubDate><content:encoded><![CDATA[<h4 id="overview">Overview</h4><p>In today&apos;s interconnected world, managing and controlling web traffic is crucial for maintaining a secure and productive environment. Our Secure Web Gateway (SWG) solution includes advanced Website Traffic Filtering capabilities to help you monitor, filter, and control the websites accessible through your network. Protect your organization from malicious content, enhance productivity, and ensure compliance with our robust and flexible traffic filtering tools.</p><h4 id="key-features">Key Features</h4><p><strong>1. Comprehensive Web Filtering</strong></p><ul><li><strong>Category-Based Filtering</strong>: Block or allow websites based on predefined categories such as social media, gambling, adult content, and more.</li><li><strong>Custom URL Filtering</strong>: Create custom lists of allowed or blocked websites tailored to your organization&#x2019;s needs.</li></ul><p><strong>2. Real-Time Threat Protection</strong></p><ul><li><strong>Malware and Phishing Blocking</strong>: Automatically block websites known to host malware, phishing attacks, and other cyber threats.</li><li><strong>Dynamic Analysis</strong>: Analyze web content in real-time to detect and block newly emerging threats.</li></ul><p><strong>3. Granular Control</strong></p><ul><li><strong>User and Group Policies</strong>: Set different web filtering rules for various user groups or individual users based on their roles and needs.</li><li><strong>Time-Based Access Control</strong>: Schedule access to specific websites or categories during certain hours to enhance productivity.</li></ul><p><strong>4. SSL Inspection</strong></p><ul><li><strong>Encrypted Traffic Monitoring</strong>: Inspect and filter HTTPS traffic to ensure that encrypted connections do not bypass your security measures.</li><li><strong>Compliance with Privacy Standards</strong>: Maintain compliance with privacy regulations while inspecting SSL traffic.</li></ul><p><strong>5. Detailed Reporting and Analytics</strong></p><ul><li><strong>Usage Reports</strong>: Generate comprehensive reports on web usage patterns, blocked sites, and policy violations.</li><li><strong>Real-Time Alerts</strong>: Receive instant notifications about attempts to access blocked content or other suspicious activities.</li></ul><p><strong>6. Easy Integration</strong></p><ul><li><strong>Seamless Deployment</strong>: Integrate easily with your existing network infrastructure and security tools.</li><li><strong>Scalable Solution</strong>: Adaptable to businesses of all sizes, from small offices to large enterprises.</li></ul><h4 id="benefits">Benefits</h4><p><strong>1. Enhanced Security</strong></p><ul><li><strong>Protect Against Threats</strong>: Shield your network from malicious websites, phishing attacks, and other cyber threats.</li><li><strong>Reduce Attack Surface</strong>: Minimize the risk of security breaches by controlling access to harmful websites.</li></ul><p><strong>2. Improved Productivity</strong></p><ul><li><strong>Eliminate Distractions</strong>: Block access to non-work-related websites to keep employees focused on their tasks.</li><li><strong>Optimize Bandwidth</strong>: Conserve bandwidth by restricting access to high-bandwidth sites that are not essential for business operations.</li></ul><p><strong>3. Compliance and Control</strong></p><ul><li><strong>Regulatory Compliance</strong>: Ensure adherence to industry regulations and internal policies by controlling web access.</li><li><strong>Enforce Acceptable Use Policies</strong>: Implement and enforce acceptable use policies to maintain a professional and secure online environment.</li></ul><p><strong>4. Insightful Analytics</strong></p><ul><li><strong>Understand Usage Patterns</strong>: Gain insights into web usage within your organization to make informed decisions.</li><li><strong>Identify Trends</strong>: Detect trends and potential issues early with detailed analytics and reports.</li></ul><h4 id="use-cases">Use Cases</h4><p><strong>1. Corporate Offices</strong></p><ul><li>Implement web filtering to maintain a secure and productive work environment.</li><li>Ensure that employees adhere to acceptable use policies and focus on work-related activities.</li></ul><p><strong>2. Educational Institutions</strong></p><ul><li>Protect students from inappropriate content and online threats.</li><li>Manage bandwidth usage to prioritize educational resources and tools.</li></ul><p><strong>3. Healthcare Organizations</strong></p><ul><li>Secure patient data by controlling access to potentially harmful websites.</li><li>Comply with healthcare regulations and protect sensitive information.</li></ul><p><strong>4. Government Agencies</strong></p><ul><li>Enforce strict web access policies to protect sensitive data and maintain security.</li><li>Ensure compliance with governmental regulations and standards.</li></ul><h4 id></h4><h4 id="why-choose-our-secure-web-gateway-with-website-traffic-filtering">Why Choose Our Secure Web Gateway with Website Traffic Filtering?</h4><ul><li><strong>Advanced Filtering Technology</strong>: Our solution uses cutting-edge technology to provide robust and accurate web filtering.</li><li><strong>User-Friendly Interface</strong>: Easy to configure and manage with an intuitive user interface.</li><li><strong>Reliable Support</strong>: Our dedicated support team is always available to help you get the most out of our solution.</li></ul><h4 id="get-started-today">Get Started Today!</h4><p>Enhance your network security and productivity with our Secure Web Gateway and Website Traffic Filtering solution. Contact us to schedule a demo or to speak with one of our experts about how we can help you achieve your security goals.</p>]]></content:encoded></item><item><title><![CDATA[Data Loss Prevention]]></title><description><![CDATA[Safeguard your sensitive information with our Secure Web Gateway's advanced Data Loss Prevention (DLP) capabilities. Prevent unauthorized data transfers, ensure compliance, and protect your business. Request a free demo today!]]></description><link>https://instasafe.com/solutions/data-loss-prevention/</link><guid isPermaLink="false">66a0c93d7820631ddaf644bf</guid><category><![CDATA[Secure Web Gateway]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 24 Jul 2024 09:29:44 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/07/Data-Loss-Prevention.png" medium="image"/><content:encoded><![CDATA[<h4 id="overview">Overview</h4><img src="https://instasafe.com/solutions/content/images/2024/07/Data-Loss-Prevention.png" alt="Data Loss Prevention"><p>In an era where data breaches and leaks are increasingly common, protecting sensitive information has become a critical priority for businesses. Our Secure Web Gateway (SWG) solution includes robust Data Loss Prevention (DLP) capabilities to help you safeguard your organization&apos;s data. With our advanced DLP features, you can prevent unauthorized data transfers, ensure regulatory compliance, and protect your intellectual property from cyber threats.</p><h4 id="key-features">Key Features</h4><p><strong>1. Comprehensive Data Monitoring</strong></p><ul><li><strong>Real-Time Detection</strong>: Monitor all data transfers in real-time to detect potential data breaches immediately.</li><li><strong>Detailed Analytics</strong>: Access detailed reports and analytics to understand data flow and identify vulnerabilities.</li></ul><p><strong>2. Content Inspection</strong></p><ul><li><strong>Deep Content Analysis</strong>: Inspect content within emails, web traffic, and file transfers to detect sensitive information.</li><li><strong>Pattern Recognition</strong>: Utilize advanced pattern recognition to identify and protect sensitive data such as credit card numbers, social security numbers, and proprietary business information.</li></ul><p><strong>3. Policy Enforcement</strong></p><ul><li><strong>Customizable Policies</strong>: Create and enforce data protection policies based on specific needs and compliance requirements.</li><li><strong>Automated Responses</strong>: Configure automated actions, such as blocking or encrypting data transfers, when policy violations are detected.</li></ul><p><strong>4. Data Encryption</strong></p><ul><li><strong>Secure Transfers</strong>: Ensure that data is encrypted during transmission to protect it from interception.</li><li><strong>Endpoint Encryption</strong>: Extend encryption to endpoints to secure data stored on devices.</li></ul><p><strong>5. User and Role Management</strong></p><ul><li><strong>Role-Based Access Control</strong>: Define and manage user roles to ensure that only authorized personnel can access sensitive data.</li><li><strong>Activity Logging</strong>: Maintain comprehensive logs of user activities to track data access and prevent unauthorized actions.</li></ul><p><strong>6. Regulatory Compliance</strong></p><ul><li><strong>Compliance Templates</strong>: Use predefined templates to quickly comply with industry regulations such as GDPR, HIPAA, and PCI-DSS.</li><li><strong>Audit Support</strong>: Generate compliance reports to support audits and demonstrate adherence to regulatory standards.</li></ul><h4 id="benefits">Benefits</h4><p><strong>1. Prevent Data Breaches</strong></p><ul><li><strong>Proactive Protection</strong>: Identify and mitigate risks before data breaches occur.</li><li><strong>Comprehensive Coverage</strong>: Protect data across all channels, including email, web, and cloud services.</li></ul><p><strong>2. Ensure Regulatory Compliance</strong></p><ul><li><strong>Stay Compliant</strong>: Meet industry-specific regulatory requirements and avoid costly fines.</li><li><strong>Streamline Audits</strong>: Simplify audit processes with detailed compliance reports and logs.</li></ul><p><strong>3. Protect Intellectual Property</strong></p><ul><li><strong>Safeguard Assets</strong>: Prevent unauthorized access to and sharing of proprietary business information.</li><li><strong>Maintain Competitive Edge</strong>: Secure intellectual property to maintain your organization&apos;s competitive advantage.</li></ul><p><strong>4. Enhance Data Security</strong></p><ul><li><strong>End-to-End Encryption</strong>: Secure data from the point of creation to its final destination.</li><li><strong>User Awareness</strong>: Educate users on data security policies and best practices to foster a culture of security.</li></ul><h4 id="use-cases">Use Cases</h4><p><strong>1. Financial Services</strong></p><ul><li>Protect customer financial data from unauthorized access and ensure compliance with financial regulations.</li><li>Monitor and control data transfers to prevent insider threats and data leaks.</li></ul><p><strong>2. Healthcare</strong></p><ul><li>Secure patient records and comply with HIPAA and other healthcare regulations.</li><li>Prevent unauthorized sharing of sensitive medical information.</li></ul><p><strong>3. Manufacturing</strong></p><ul><li>Protect proprietary manufacturing processes and intellectual property.</li><li>Ensure that trade secrets and confidential information are not leaked.</li></ul><p><strong>4. Education</strong></p><ul><li>Safeguard student records and personal information.</li><li>Ensure compliance with education-specific data protection regulations.</li></ul><h4 id="why-choose-our-secure-web-gateway-with-dlp">Why Choose Our Secure Web Gateway with DLP?</h4><ul><li><strong>Integrated Solution</strong>: Combines advanced data loss prevention with robust web security features.</li><li><strong>Scalable and Flexible</strong>: Adapts to the needs of businesses of all sizes and industries.</li><li><strong>Expert Support</strong>: Our dedicated support team is always available to assist with deployment, management, and optimization.</li></ul><h4 id="get-started-today">Get Started Today!</h4><p>Protect your sensitive data with our Secure Web Gateway and Data Loss Prevention solution. Contact us to schedule a demo or to speak with one of our experts about how we can help safeguard your organization&#x2019;s information.</p>]]></content:encoded></item><item><title><![CDATA[Internet Access Control]]></title><description><![CDATA[Discover our Internet Access Control solution to monitor, manage, and secure internet usage across your organization. Increase productivity, protect data, and ensure compliance with our comprehensive and easy-to-use platform. Request a free demo today!]]></description><link>https://instasafe.com/solutions/internet-access-control/</link><guid isPermaLink="false">66a0b8bb7820631ddaf644ad</guid><category><![CDATA[Secure Web Gateway]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Wed, 24 Jul 2024 08:36:57 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/07/Internet-Access-Control.png" medium="image"/><content:encoded><![CDATA[<h4 id="overview">Overview</h4><img src="https://instasafe.com/solutions/content/images/2024/07/Internet-Access-Control.png" alt="Internet Access Control"><p>In today&apos;s digital age, managing and securing internet access is more critical than ever. Our Internet Access Control solution provides businesses with the tools they need to monitor, manage, and secure internet usage across their networks. Ensure productivity, enhance security, and maintain compliance with our comprehensive and easy-to-use platform.</p><h4 id="key-features">Key Features</h4><p><strong>1. Comprehensive Monitoring</strong></p><ul><li><strong>Real-Time Tracking</strong>: Monitor internet activity in real-time across all connected devices.</li><li><strong>Detailed Reports</strong>: Generate detailed reports on internet usage patterns, helping you understand and optimize network traffic.</li></ul><p><strong>2. Advanced Filtering</strong></p><ul><li><strong>Content Filtering</strong>: Block inappropriate or non-work-related websites with customizable content filters.</li><li><strong>Keyword Blocking</strong>: Prevent access to sites containing specific keywords to ensure compliance with company policies.</li></ul><p><strong>3. User-Based Controls</strong></p><ul><li><strong>Customizable Policies</strong>: Set internet access policies based on user roles, departments, or individual employees.</li><li><strong>Time-Based Restrictions</strong>: Schedule internet access restrictions to ensure focus during work hours and reduce bandwidth usage.</li></ul><p><strong>4. Enhanced Security</strong></p><ul><li><strong>Threat Detection</strong>: Identify and block malicious websites and potential cyber threats in real-time.</li><li><strong>SSL Inspection</strong>: Inspect encrypted traffic to ensure no threats are hidden behind secure connections.</li></ul><p><strong>5. Data Protection</strong></p><ul><li><strong>Data Loss Prevention</strong>: Prevent sensitive data from being transmitted to unauthorized websites.</li><li><strong>Audit Logs</strong>: Maintain detailed logs of internet activity for compliance and auditing purposes.</li></ul><h4 id="benefits">Benefits</h4><p><strong>1. Boost Productivity</strong></p><ul><li><strong>Eliminate Distractions</strong>: By blocking non-work-related websites, employees can focus better on their tasks.</li><li><strong>Optimize Bandwidth</strong>: Ensure that valuable bandwidth is reserved for business-critical applications.</li></ul><p><strong>2. Enhance Security</strong></p><ul><li><strong>Protect Against Threats</strong>: Shield your network from malware, phishing, and other cyber threats.</li><li><strong>Secure Data</strong>: Prevent data breaches and ensure sensitive information stays within the organization.</li></ul><p><strong>3. Ensure Compliance</strong></p><ul><li><strong>Regulatory Adherence</strong>: Meet industry-specific regulations by controlling and monitoring internet access.</li><li><strong>Policy Enforcement</strong>: Automatically enforce company internet usage policies.</li></ul><p><strong>4. Gain Insights</strong></p><ul><li><strong>Usage Analytics</strong>: Gain valuable insights into internet usage patterns to make informed decisions.</li><li><strong>Employee Behavior</strong>: Understand employee behavior online to create better internet usage policies.</li></ul><h4 id="use-cases">Use Cases</h4><p><strong>1. Corporate Offices</strong></p><ul><li>Manage internet access for large teams, ensuring productivity and security.</li><li>Enforce company policies across various departments and roles.</li></ul><p><strong>2. Educational Institutions</strong></p><ul><li>Protect students from inappropriate content and cyber threats.</li><li>Manage bandwidth usage to ensure smooth operation of educational tools and resources.</li></ul><p><strong>3. Healthcare Providers</strong></p><ul><li>Ensure compliance with data protection regulations.</li><li>Secure patient data by controlling internet access points.</li></ul><p><strong>4. Financial Services</strong></p><ul><li>Protect sensitive financial data from cyber threats.</li><li>Ensure compliance with stringent industry regulations.</li></ul>]]></content:encoded></item><item><title><![CDATA[Secure Access for Salesforce]]></title><description><![CDATA[With InstaSafe, enterprises can now provide users with secure access to Salesforce using InstaSafe Single Sign On (SSO) and Multi Factor Authentication (MFA)]]></description><link>https://instasafe.com/solutions/secure-access-for-salesforce/</link><guid isPermaLink="false">6668195f6764ff036a724a4a</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Tue, 11 Jun 2024 09:33:39 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/06/Salesforce---InstaSafe-.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/06/Salesforce---InstaSafe-.png" alt="Secure Access for Salesforce"><p>Salesforce is a powerful Customer Relationship Management (CRM) platform that many businesses rely on for managing their sales, customer service, and marketing operations. Given its critical role in storing and processing sensitive customer data, ensuring secure access to your Salesforce application is essential. This article explores various methods to enhance the security of your Salesforce environment, focusing on Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other best practices to safeguard your data.</p><h2 id="introduction-to-salesforce-security">Introduction to Salesforce Security</h2><p>Securing your Salesforce application involves implementing multiple layers of protection. These layers include managing user access, configuring network security, enabling logging and monitoring, and integrating with security tools. Let&apos;s delve into these strategies to enhance the security of your Salesforce environment.</p><h2 id="1-managing-user-access">1. Managing User Access</h2><h3 id="a-use-strong-password-policies">a. Use Strong Password Policies</h3><p>Implementing strong password policies is the first step in securing user accounts. Ensure all users follow best practices for password creation:</p><ul><li>Use a mix of upper and lower case letters, numbers, and special characters.</li><li>Avoid common passwords and patterns.</li><li>Change passwords regularly and avoid reuse.</li></ul><h3 id="b-enable-two-factor-authentication-2fa">b. Enable Two-Factor Authentication (2FA)</h3><p>Two-Factor Authentication adds an additional layer of security by requiring users to provide a second form of verification. Salesforce supports 2FA through various methods such as SMS, authenticator apps, and hardware tokens.</p><h3 id="c-implement-role-based-access-control-rbac">c. Implement Role-Based Access Control (RBAC)</h3><p>Salesforce&apos;s RBAC allows you to assign roles to users based on their responsibilities. By limiting access to certain functionalities, you can minimize the risk of unauthorized actions:</p><ul><li><strong>Standard User:</strong> Can access and use the applications they are assigned.</li><li><strong>System Administrator:</strong> Can manage application settings and user permissions.</li></ul><h2 id="2-configuring-network-security">2. Configuring Network Security</h2><h3 id="a-restrict-ip-access">a. Restrict IP Access</h3><p>Restricting IP access ensures that only trusted networks can access your Salesforce instance. Configure firewall rules to allow traffic only from known IP addresses and block others.</p><h3 id="b-use-https">b. Use HTTPS</h3><p>Always use HTTPS to encrypt data in transit. This ensures that sensitive information, such as login credentials and API tokens, is not intercepted by unauthorized parties. Obtain an SSL certificate from a trusted Certificate Authority (CA) and configure your Salesforce instance to use it.</p><h2 id="3-enabling-logging-and-monitoring">3. Enabling Logging and Monitoring</h2><h3 id="a-enable-auditing">a. Enable Auditing</h3><p>Auditing logs are crucial for tracking and investigating security incidents. Salesforce provides auditing features to log important events such as login attempts, changes to user permissions, and modifications to critical settings.</p><h3 id="b-monitor-user-activity">b. Monitor User Activity</h3><p>Monitoring user activity helps in identifying unusual or unauthorized actions. Implement monitoring tools that provide insights into user behavior and alert you to potential security threats.</p><h2 id="4-integrating-with-instasafe-for-enhanced-security">4. Integrating with InstaSafe for Enhanced Security</h2><h3 id="a-single-sign-on-sso">a. Single Sign-On (SSO)</h3><p>InstaSafe Secure Access enables seamless and one-click access to Salesforce applications using Single Sign-On. With SSO, users authenticate once and gain access to multiple applications without needing to sign in repeatedly. This not only enhances user convenience but also improves security by reducing the risk of password fatigue.</p><h3 id="b-multi-factor-authentication-mfa">b. Multi-Factor Authentication (MFA)</h3><p>MFA provides an additional layer of security by requiring users to verify their identity through multiple methods such as OTP, T-OTP, push notifications, biometric verifications, or hardware tokens. This reduces the risk of unauthorized access due to compromised passwords.</p><h3 id="c-device-authentication">c. Device Authentication</h3><p>InstaSafe ensures that only authorized and compliant devices can access your Salesforce instance. By enforcing device authentication, you significantly reduce the chances of data breaches and ensure that only the right users with the right devices are accessing your application.</p><h2 id="benefits-of-instasafe-secure-access-for-salesforce">Benefits of InstaSafe Secure Access for Salesforce</h2><h3 id="1-granular-access-controls">1. Granular Access Controls</h3><p>InstaSafe allows you to provision users or user groups based on their roles, determining who can access specific applications. This granular control enhances security by ensuring that only authorized personnel can access sensitive information.</p><h3 id="2-complete-visibility">2. Complete Visibility</h3><p>Gain complete visibility of user activity with InstaSafe&#x2019;s detailed insights. This visibility helps in monitoring user behavior, detecting anomalies, and improving overall security posture.</p><h3 id="3-enhanced-security-with-seamless-user-experience">3. Enhanced Security with Seamless User Experience</h3><p>By integrating MFA and SSO, InstaSafe provides an enhanced security layer while maintaining a seamless user experience. Users enjoy easy access without compromising on security.</p><h3 id="4-easy-to-deploy">4. Easy to Deploy</h3><p>InstaSafe Secure Access can be set up in minutes, making it easy to get started. The straightforward deployment process ensures that your Salesforce instance is quickly secured without extensive configuration.</p><h2 id="step-by-step-guide-for-configuring-salesforce-with-single-sign-on-using-saml">Step by Step Guide for configuring Salesforce with Single Sign On using SAML </h2><p></p><ul><li>Login to the Instasafe Admin Console with valid credentials.</li><li>Go to the IDP/ Identity provider section in Identity Management.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXehND4u7wmpdpGXR2Z5xH7ADa_RKcqnk1XC7fSFlggWvQDp9qWxgsLTGT9TeGhS9gcgCw769bE6Pg3Bw_1nCD53K7bc9xOAc-Fh5zzgzqhKuRKjRm2F3gz9xY3XtWLGLPbZhlmdZ2ZsVEh_A4X3Y96m9U3F?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="450" height="103"></figure><ul><li>In choose IDP, select the application type as SAML.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcJpdeV6qhsWwXWDi_AQlVRe7ZYa1vx0rs9b0kEGT5T7xKKOZCRlJsPtoNsICfwT9fj0Si2xqNhiFtBikzZ0e-i7w8MDcQ6mf7LdSaP1m8RcO84SI0Fu-SKR5tIg1lmhgfkEkxWqIILAhdtg_zRCtrcg0A?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="460" height="258"></figure><ul><li>Enter <strong>IDP Name</strong> as Salesforce.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfx__1D1WBgKD-foHxeY_psqneksZ9h6HQYaVMiKI5MVIFPZba4aqVlnAU7eGUvD0FJvTVHzSX0WstHgdx3DMgCJy3A6EdvcpTIhVCvDjN27dfU5goFQMIHINHrTtzw_TWpBI1KjuB_aUkxF40-uR-ivjSz?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="624" height="261"></figure><ul><li>Enter the <strong>SP Entity ID</strong> or <strong>Issuer&#xA0;</strong></li><li>Enter the <strong>ACS URL</strong></li><li>Exchange SAML metadata between Salesforce and ZTAA to establish the trust relationship.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcA---O1RysB4IUi9rWG3FfUuc06MmLdJMDKdWSBiqaR9ipiWRzcEaYStU-vEEMtsfMZ0aHdUPiWvAZi2xPFTioNlYd81yoBimsKFq9cs8pNAyvQOzFgH2ZJvf_LSkwMdvm881q7n_wKkO64xgN7fC9GCA?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="509" height="267"></figure><p></p><ul><li>&#xA0;&#xA0;In the <strong>Attribute Mapping</strong> tab configure the following attributes as shown in the image below.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeaaz2og2j4558krVUGXmVn2cqA9UXaHqhyTX-Y4fU8wHXRuxei9CO0G1WwJ_064Um-Wfezsc2wWcEDrYqp9XlR8hWiPjqb7Q1K0tXtO_Vz66Vq2yRjAWNPGqEPZdMc5PqiI9RgqVJu6SCLQ0IS8u9bdWE?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="578" height="270"></figure><p><br></p><p><strong>Salesforce Application Set Up In Instasafe console</strong></p><ul><li>In the Instasafe admin console.</li><li>Go to applications in perimeter management.</li><li>Create the Salesforce application and add the logo if needed.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXf1nv8WAjMw4NSnPAlyWCvjWk4TeDFExCmwHfpZYTaMK3ov8lJqRime9u2ngyIWApwlfM1R-j80L-YXgzvZxVupZh6_jeVNeb2rIDm29g0-rdZIEtzyWE_5m-qmK3LEKF4gU30-ZXOeExyLX3dnLh_3l4Pb?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="586" height="192"></figure><ul><li>&#xA0;Create the application.</li></ul><p></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdfq5lLrilMfEolX4HxHfDvYcaVmqEwu7iFJMwNSfLy6vIO_mEEDJji4Pizm6vX1Jy1U3GzvORK2ThbtyUjLR3XXagyY4MK9BcCDhOITVWV4oLmrQ3azuCjvxgQGPgMb0dPqpbqUbHkFYHjxAPuzXfc4by9?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="577" height="225"></figure><p><strong>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Set up the Access policy for the application access</strong></p><ul><li>In the access policy create an policy for Salesforce access</li><li>Enter the policy name</li><li>Choose the expiry date as per requirement.</li><li>Click on the next button</li></ul><p>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfaebdLRHPJ00BEFVMm-8p8N4UMEupPvym80LW2UGgi_pkSQJk1EPOI7BVdgRBRHazXRDkblGeWMM3N7lDn9n6khT_bDsFXj069X9vgLwg-kl-d1LSEy-xcrI6n998yRLKwnL4FwEdVRdf_NpA55Nq3YJzo?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="550" height="232"></figure><ul><li>Click on the add button and add the user or user group to whom you want to give access to the Salesforce application.</li></ul><p>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdOzXw84Q7hlh2NsoEOfTm5-j8hIZ5cQMWMNVqxheTmFu4eoGUvEvD8LUt3t4AJBFrFAyXqEjOehxO8MENGdALqQFEniycP3C84FeGBuENzgdokFxRLTcs6VFm44NvEtX_rTNrVSameFcHa1eFmxFr4Gnv5?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="569" height="249"></figure><ul><li>Add the salesforce application&#xA0;&#xA0;&#xA0;</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfmTq3WX_YdMjZK-VSFmyDQXScShJXFdN43676Y2ZUwtk46OiW9ywW0KWSV3Kqfcr5HWZJb7eW1oysbYi5Gidlpu6_Vxdf2t6lODpYnTo55IsbbszAgkQKvoQivpxbsUQWdocZg4GAQQgaLOgpyLmC9awE?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="581" height="224"></figure><ul><li>Save the access policy</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcOEenO97yK1mgyf3kBw90ODA82SE3V-BRNqt3pYY6Vs_z57J-YNyoVjFFA_PpegATAzpzbt1cJ1kaHQ8lwejQ1NdguUseDflgrkRqrrjDe2xGvz7emzMvm6rE3XddvuUSir8dFzll2W_mJLVXpObHSuQs?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="546" height="226"></figure><p></p><ul><li>Test SSO and Conditional Access:<ul><li>Verify that users can successfully authenticate to Salesforce using SSO via ZTAA.</li></ul></li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcP1H43rJwyfC6fW0GU2q6uh2BuV3Gr7bmj8Tjes0tXYQSefOvQs3fqLV9Xbx6fkyod8Zmv8zGZtYDr5IjwHWmfagpsXktFJzHyP4XrHQk4sPVQGCkkm1kw9IeahqDnitrrIrHcugMfqMksC0RYVDnnv1CG?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="466" height="316"></figure><p>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfi793yDV07G3cP3jxZ9Rk7bR24pgGPMHI_7ogjvqU3jtxGaREjirmPlswKVeACNTpQVLptRvgMDzIcOaaXlV-aDHIIf4g4FOeKDXSiE_iIbUOIrYGeDCrHuGZnpz9RNHqnsSKd0R1qzwBM2Df0OJMOQ8c?key=L8KQIsEyAV6QyK0YsdvpbA" class="kg-image" alt="Secure Access for Salesforce" loading="lazy" width="624" height="264"></figure><h2 id="conclusion">Conclusion</h2><p>Securing your Salesforce application is crucial to protecting your customer data and maintaining the integrity of your workflows. By implementing strong user access controls, network security measures, and leveraging InstaSafe&#x2019;s Secure Access solution with SSO and MFA, you can ensure that your Salesforce instance remains secure, user-friendly, and protected from potential threats.</p>]]></content:encoded></item><item><title><![CDATA[Secure Access for Zoho]]></title><description><![CDATA[With InstaSafe, enterprises can now provide users with secure access to Zoho using InstaSafe Single Sign On (SSO) and Multi Factor Authentication (MFA)]]></description><link>https://instasafe.com/solutions/secure-access-for-zoho/</link><guid isPermaLink="false">6668191f6764ff036a724a3d</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Tue, 11 Jun 2024 09:30:55 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/06/Zoho---InstaSafe-.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/06/Zoho---InstaSafe-.png" alt="Secure Access for Zoho"><p>Zoho offers a comprehensive suite of online productivity tools and SaaS applications for businesses of all sizes. As organizations rely more on Zoho for their operational needs, securing access to these applications becomes increasingly important. This article explores various methods to enhance the security of your Zoho environment, focusing on Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other best practices to protect your data.</p><h2 id="introduction-to-zoho-security">Introduction to Zoho Security</h2><p>Securing your Zoho application involves multiple layers of protection. These include managing user access, configuring network security, enabling logging and monitoring, and integrating with security tools. Let&apos;s explore these strategies to enhance the security of your Zoho environment.</p><h2 id="1-managing-user-access">1. Managing User Access</h2><h3 id="a-use-strong-password-policies">a. Use Strong Password Policies</h3><p>Implementing strong password policies is the first step in securing user accounts. Ensure all users follow best practices for password creation:</p><ul><li>Use a mix of upper and lower case letters, numbers, and special characters.</li><li>Avoid common passwords and patterns.</li><li>Change passwords regularly and avoid reuse.</li></ul><h3 id="b-enable-two-factor-authentication-2fa">b. Enable Two-Factor Authentication (2FA)</h3><p>Two-Factor Authentication adds an additional layer of security by requiring users to provide a second form of verification. Zoho supports 2FA through various methods such as SMS, authenticator apps, and hardware tokens.</p><h3 id="c-implement-role-based-access-control-rbac">c. Implement Role-Based Access Control (RBAC)</h3><p>Zoho&apos;s RBAC allows you to assign roles to users based on their responsibilities. By limiting access to certain functionalities, you can minimize the risk of unauthorized actions:</p><ul><li><strong>User:</strong> Can access and use the applications they are assigned.</li><li><strong>Admin:</strong> Can manage application settings and user permissions.</li></ul><h2 id="2-configuring-saml-in-zoho-accounts">2. Configuring SAML in Zoho Accounts</h2><p>To create a SAML connection between Zoho and InstaSafe, you will need to provide some details from Zoho to your InstaSafe, and vice versa. You can get Zoho&apos;s details from the Zoho metadata and provide them to your InstaSafe IdP while configuring SAML.&#xA0; Similarly, you will need to get the required details from your InstaSafe IdP to configure SAML in Zoho.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2024/06/image-3.png" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="1602" height="827" srcset="https://instasafe.com/solutions/content/images/size/w600/2024/06/image-3.png 600w, https://instasafe.com/solutions/content/images/size/w1000/2024/06/image-3.png 1000w, https://instasafe.com/solutions/content/images/size/w1600/2024/06/image-3.png 1600w, https://instasafe.com/solutions/content/images/2024/06/image-3.png 1602w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">SAML configuration in Zoho</span></figcaption></figure><p>For detailed documentation, please refer this <a href="https://help.zoho.com/portal/en/kb/accounts/manage-your-organization/saml/articles/configure-saml-in-zoho-accounts?ref=instasafe.com" rel="noreferrer">LINK</a></p><h2 id="3-enabling-logging-and-monitoring">3. Enabling Logging and Monitoring</h2><h3 id="a-enable-auditing">a. Enable Auditing</h3><p>Auditing logs are crucial for tracking and investigating security incidents. Zoho provides auditing features to log important events such as login attempts, changes to user permissions, and modifications to critical settings.</p><h3 id="b-monitor-user-activity">b. Monitor User Activity</h3><p>Monitoring user activity helps in identifying unusual or unauthorized actions. Implement monitoring tools that provide insights into user behavior and alert you to potential security threats.</p><h2 id="4-integrating-with-instasafe-for-enhanced-security">4. Integrating with InstaSafe for Enhanced Security</h2><h3 id="a-single-sign-on-sso">a. Single Sign-On (SSO)</h3><p>InstaSafe Secure Access enables seamless and one-click access to Zoho applications using Single Sign-On. With SSO, users authenticate once and gain access to multiple applications without needing to sign in repeatedly. This not only enhances user convenience but also improves security by reducing the risk of password fatigue.</p><h3 id="b-multi-factor-authentication-mfa">b. Multi-Factor Authentication (MFA)</h3><p>MFA provides an additional layer of security by requiring users to verify their identity through multiple methods such as OTP, T-OTP, push notifications, biometric verifications, or hardware tokens. This reduces the risk of unauthorized access due to compromised passwords.</p><h3 id="c-device-authentication">c. Device Authentication</h3><p>InstaSafe ensures that only authorized and compliant devices can access your Zoho instance. By enforcing device authentication, you significantly reduce the chances of data breaches and ensure that only the right users with the right devices are accessing your application.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2024/06/image-2.png" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="1486" height="902" srcset="https://instasafe.com/solutions/content/images/size/w600/2024/06/image-2.png 600w, https://instasafe.com/solutions/content/images/size/w1000/2024/06/image-2.png 1000w, https://instasafe.com/solutions/content/images/2024/06/image-2.png 1486w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Single Sign On Portal for Zoho Applications</span></figcaption></figure><h2 id="benefits-of-instasafe-secure-access-for-zoho">Benefits of InstaSafe Secure Access for Zoho</h2><h3 id="1-granular-access-controls">1. Granular Access Controls</h3><p>InstaSafe allows you to provision users or user groups based on their roles, determining who can access specific applications. This granular control enhances security by ensuring that only authorized personnel can access sensitive information.</p><h3 id="2-complete-visibility">2. Complete Visibility</h3><p>Gain complete visibility of user activity with InstaSafe&#x2019;s detailed insights. This visibility helps in monitoring user behavior, detecting anomalies, and improving overall security posture.</p><h3 id="3-enhanced-security-with-seamless-user-experience">3. Enhanced Security with Seamless User Experience</h3><p>By integrating MFA and SSO, InstaSafe provides an enhanced security layer while maintaining a seamless user experience. Users enjoy easy access without compromising on security.</p><h3 id="4-easy-to-deploy">4. Easy to Deploy</h3><p>InstaSafe Secure Access can be set up in minutes, making it easy to get started. The straightforward deployment process ensures that your Zoho instance is quickly secured without extensive configuration.</p><h2 id="step-by-step-guide-for-configuring-zoho-single-sign-on-sso">Step by Step Guide for configuring Zoho Single Sign On (SSO)</h2><p></p><p><strong>Prerequisites</strong></p><ul><li>If you&apos;re already a Zoho One user, proceed to the next point. If you haven&apos;t signed up yet, log in to <a href="https://one.zoho.in/?ref=instasafe.com">Zoho One</a> and complete the registration. Registering with Zoho One is necessary to enable Single Sign-On (SSO) configurations in Zoho Accounts.</li><li>Login to <a href="https://accounts.zoho.com/?ref=instasafe.com">Zoho Account</a>.</li><li>In the left panel, under Organization, click SAML Authentication.</li><li>Click Download Metadata. A file named &quot;zohometadata.xml&quot; will be downloaded. (Will be required later)</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeyuKzYwtblk9PaWDZ7NS2BjObVfMQMQSeyz-vQcMGEHQOJjEP_IWdcmAZKw9iL-uaA2Y9UswM2zbRP8CiFha7iRzWP06t2SBSfIf5OlUv2lrG4BGSuLCUSQmmUtLmgFJ4_Jcz2XMewKhEBJKwXQ36JriDP?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="624" height="269"></figure><p></p><p><strong>Configure Zoho in Instasafe:</strong></p><ul><li>Login to the Instasafe Admin Console.</li><li>Go to the IDP section in Identity management.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXc09NNUEQp8IWqKpgbUqR539ZbHBSGbKgQ64xyXPQ_7KA3LMNkq_D6U6hH6Y015IXFZxOMhZMyIDbLBI7EmP-UA4hqtItcReOumrtHm7QIiYulXa6wZKSZ1ctfz3R-Ocl0fh-XwzuCtQCZJsBC15Fd8pQ3w?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="565" height="103"></figure><ul><li>In choose IDP, select the application type as SAML.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcOgIgVhgDkiRGDkzQydXjKes5rfE_o1p_A4Oa2JR1rR5EPdqUy2nsUGBS2htY7KIQWcgvMijXMwoQaWRXIPLsOS0wC61BXCHF2oAqR4Vv-Zsy-_Lt8kLISykSgen2D6yZ9vJuEpQf8qa7A3T_BKhhebml9?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="567" height="305"></figure><p></p><ul><li>Enter the IDP name as zoho</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXde-7t3WtOfYUKE_QdjWVVW5VFJVLhVJnGdPbTkBt9GojHmgOpAsVSB8Zkxs2aVMOtOsZE5iasAgMGOrHrCWC93DR-oBYKtpH_t4XVj_faqkNU5PVpyMQpgNtbklJ5P5T3Mnjcu6eb1F5GdX4a_IGDiyB3e?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="577" height="259"></figure><ul><li>Enter the <strong>SP Entity ID</strong> or <strong>Issuer&#xA0;</strong></li><li>Enter the <strong>ACS URL :</strong> Enter the<strong> IDP entity </strong>ID&#xA0;</li><li>Click on Next to proceed further.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdllH7S7Yuz87xnUaR5VELneim784nj3Q_rj8xxMqf0N5XyqtPwEglNeFeJzYxmgieduEzCwBzXyed6zBUhGWD1Mj8EwG5iRtcFJHMr7xFEioodhrLf_FrjFdaz3F6lp9ZUgUZZmmF31c8c0aiHTIMfACs?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="561" height="290"></figure><p></p><ul><li>In the <strong>Attribute Mapping</strong> tab configure the following attributes as shown in the image below.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXchPNWlYw7uLenRStU9vO7z2MOD20j7Zjzqgzwu4-uAAhtHQFdheucQlQIm42G6pwqPyXuPKNaxuS_YJhF6yZcCXx2vwC8OEMmnk5CjsfvIWBHS2LzIuKU8X2BrPCUKqw3QwqHQFDRdoxWK35KOwAfzmKpo?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="578" height="270"></figure><p><br></p><p><strong>Application set up in InstaSafe console</strong></p><ul><li>In the Instasafe admin console.</li><li>Go to applications in perimeter management.</li><li>Create the Zoho application and add the logo if needed.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfFp2OEPrloyZoaFNiNGLWkVrqwHfpqyRijcVLVZptIVYKCYoXWr0l6kH0hiir7rn082OunZnouG8-NFLqrlWLHpr3CQnfj3mmadyTP15MOZ80Ai4OM5V--uEf_Vyer5X_JScwviG3FefmyWGiXeaqXekeS?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="586" height="236"></figure><p><br></p><p><strong>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;Set up the Access policy for the application access</strong></p><ul><li>In the access policy create an policy for Zoho access</li><li>Enter the policy name</li><li>Choose the expiry date as per requirement.</li><li>Click on the next button</li></ul><p></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcjy0KJQpFLbtnP0WA-p6DfC3ejE3d8I7jgyDDF04l3Xe21M5_dl9HIm_NlUnUUi4Cn0CIe7MbCaTRShu4rtC4i1hpGLAjO0GSMwq9JC7YCkwb4e6I8emGofA_EXkVPmkAdaxdEXAJBRmnKDEqg0tEJlQIj?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="550" height="232"></figure><ul><li>Click on the add button and add the user or user group to whom you want to give access to the Zoho application.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfjwLoIpZaievBHtD3SrCA_AkRSYMfzMQYOGTl9ucsSjatIIM0auIwfBchJwzU8Q-exZom9yCbnQVbvq686ZNY1H9oS-4c1iuu0SpEuayAfeNXx7YLHc_XXmO_rec1ZJn4ac7t06-P86dgfnuHqA5D5Ttzx?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="569" height="249"></figure><ul><li>Add the zoho application</li></ul><p>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfKTcmF5UV-PCiUFQxbPwXI41qp6WCLZ2XEYxpe6nrLtHs_Z14NOJqh1gLbYOXQfLi1uDhirggQvr9uqX_hGfHWQhlb530tPx-cXK4uHE64VDnMqRqsXnZ4u7TD6SLVLn-2qn6-Jr67Q4_oSujwIHxcai8?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="447" height="224"></figure><p></p><ul><li>&#xA0;&#xA0;Save the access policy</li></ul><p><strong>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</strong></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXezJcdchwagNpifMT0TJKowodNzb-ylOmdSELRvWosRWQZW8r1y91UeNl41DCRU4zeF__d_XHUpOWG6tQp7GTtvk7ZjuzBRvIBNa2zofaBMFvLLdh4cwSogvL4sG-Ls4TRwAP-7e-BL1Y42Rxe2Wp3qh0O3?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="507" height="226"></figure><p></p><h3 id="configure-single-sign-on-sso-in-zoho-admin-account"><strong>Configure Single Sign-on (SSO) in Zoho Admin Account</strong></h3><ul><li>Go to the Zoho Account, in the side navigation go to Organisation &gt; SAML Authentication and click on Set up Now.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeCAEZQfW1pjVH-08zJcOoz7hipz5bWXNle3OeZPt5TYG2MdVs8iRudmnYnnMnfMQaKcGOP3iDsG0zchcgBbmMqH6swLx4qXywEmy9JR5qisZB4QLoLmVo0z23r_tR5Ne4s-JHaXmv-4GkuFYeg9RP_S2s?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="624" height="273"></figure><ul><li>In the SAML Authentication popup, enter the <strong>SAML Login URL</strong> in <strong>Sign-in URL</strong> field and <strong>SAML Logout URL</strong> in <strong>Sign Out URL</strong> field.</li><li>In <strong>X.509 Certificate</strong> field, upload the certificate file downloaded in the <a href="https://www.miniorange.com/zoho-single-sign-on-(sso)?ref=instasafe.com#menu2">previous step</a>.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdToudz205alW0LNtnrf_6zXBkfPdYK136uOufeAMneVl3iybtWnOymCfAujPaIKLB4SddF04VfmRjrPu_ioetk8jWCdOx-3fo6MXzaYkQEeu-MQhSRvwHHG0G_pnQF34VAsayaXUWqdZyK0BhKPaIV8gfB?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="624" height="739"></figure><ul><li>Click <strong>Submit</strong>. Instasafe as an IDP is configured successfully.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXemG9BQkFaoANg4rmiuHYdhWtBFgSDo9NkjSTOitXSVUwjoCu7XsYV96I29iceAFjwwlnmjpbFcsvJer4ekvoT-BovghkwkwLilXXPzuAqXa5TYMp7FMat_96hoXNJE7SdaR4fyVGIw_tWCT6n8ZNwqoHci?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="624" height="305"></figure><p></p><h3 id="test-sso-configuration"><strong>Test SSO Configuration</strong></h3><ul><li>Try signing in to a Zoho application (for example, Zoho CRM) using a user present in the Zoho.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeMItm-QVquvTCAvM-Y-hA3K_IEg4vmQ0Kkz9oldc0ZYhMZEBPS8FNrG1Yg-9iH4Iya9SjhtefPih6-o0LWp5quLl4eFuV7q3jDJoEjwpoJsMHxYchcd0xwChMmXRMN5BF9963bTohVvPNvByZ1DcKz-3M?key=3sd-VhYqD7uivfb3-m3kJA" class="kg-image" alt="Secure Access for Zoho" loading="lazy" width="624" height="377"></figure><ul><li>After entering the Email Address registered in Zoho, the user will be redirected to the user store for authentication in the Instasafe portal. If the user is authenticated successfully, they will be redirected back to the Zoho application as a logged-in user.</li></ul><h2 id="conclusion">Conclusion</h2><p>Securing your Zoho application is crucial to protecting your business data and maintaining the integrity of your workflows. By implementing strong user access controls, network security measures, and leveraging InstaSafe&#x2019;s Secure Access solution with SSO and MFA, you can ensure that your Zoho instance remains secure, user-friendly, and protected from potential threats.</p>]]></content:encoded></item><item><title><![CDATA[Secure Access for GitHub]]></title><description><![CDATA[With InstaSafe, enterprises can now provide users with secure access to Github using InstaSafe Single Sign On (SSO) and Multi Factor Authentication (MFA)]]></description><link>https://instasafe.com/solutions/secure-access-for-github/</link><guid isPermaLink="false">666817f76764ff036a724a2e</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Tue, 11 Jun 2024 09:28:24 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/06/Github---InstaSafe-.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/06/Github---InstaSafe-.png" alt="Secure Access for GitHub"><p>GitHub has become an essential tool for developers and organizations worldwide, providing a platform for collaboration, code sharing, and project management. Given its critical role, securing access to your GitHub repositories is paramount. This article explores various methods to enhance the security of your GitHub environment, emphasizing Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other best practices to safeguard your code and data.</p><h2 id="introduction-to-github-security">Introduction to GitHub Security</h2><p>Securing your GitHub application involves implementing several layers of protection. These include managing user access, configuring network security, enabling logging and monitoring, and integrating with security tools. Let&apos;s delve into these strategies to enhance the security of your GitHub environment.</p><h2 id="1-managing-user-access">1. Managing User Access</h2><h3 id="a-use-strong-password-policies">a. Use Strong Password Policies</h3><p>Implementing strong password policies is the first step in securing user accounts. Ensure all users follow best practices for password creation:</p><ul><li>Use a mix of upper and lower case letters, numbers, and special characters.</li><li>Avoid common passwords and patterns.</li><li>Change passwords regularly and avoid reuse.</li></ul><h3 id="b-enable-two-factor-authentication-2fa">b. Enable Two-Factor Authentication (2FA)</h3><p>Two-Factor Authentication adds an additional layer of security by requiring users to provide a second form of verification. GitHub supports 2FA through various methods such as SMS, authenticator apps, and hardware tokens.</p><h3 id="c-implement-role-based-access-control-rbac">c. Implement Role-Based Access Control (RBAC)</h3><p>GitHub&apos;s RBAC allows you to assign roles to users based on their responsibilities. By limiting access to certain functionalities, you can minimize the risk of unauthorized actions:</p><ul><li><strong>Read:</strong> Can view the repository.</li><li><strong>Write:</strong> Can push to the repository.</li><li><strong>Admin:</strong> Can manage repository settings and user permissions.</li></ul><h2 id="2-configuring-saml-single-sign-on-for-your-enterprise">2. Configuring SAML single sign-on for your enterprise</h2><p>Enterprise owners can enable SAML SSO and centralized authentication through a SAML IdP across all organizations owned by an enterprise account. After enabling SAML SSO for enterprise account, SAML SSO is enforced for all organizations owned by enterprise account. All members will be required to authenticate using SAML SSO to gain access to the organizations where they are a member, and enterprise owners will be required to authenticate using SAML SSO when accessing an enterprise account.</p><p>To access each organization&apos;s resources on GitHub Enterprise Cloud, the member must have an active SAML session in their browser. To access each organization&apos;s protected resources using the API and Git, the member must use a personal access token or SSH key that the member has authorized for use with the organization. Enterprise owners can view and revoke a member&apos;s linked identity, active sessions, or authorized credentials at any time.</p><p>For detailed configuration, please refer this <a href="https://docs.github.com/en/enterprise-cloud@latest/admin/identity-and-access-management/using-saml-for-enterprise-iam/configuring-saml-single-sign-on-for-your-enterprise?ref=instasafe.com" rel="noreferrer">LINK</a></p><p><strong>Prerequisites</strong></p><ul><li><a href="https://github.com/?ref=instasafe.com">GitHub Administrator</a> account is required to do the configuration and setup SAML Single Sign-on (SSO)</li><li>GitHub Enterprise Gold plan is required. Other GitHub plans like Developer or Team do not support SAML Single Sign-on (SSO)</li><li>Note - Make sure you do not enable SSO for all users before testing and getting the Single Sign-on (SSO) recover codes from GitHub</li></ul><p><strong>Github enterprise edition</strong></p><p>GitHub Enterprise Edition offers enhanced security with advanced vulnerability scanning and compliance tools, including the exclusive option of single sign-on (SSO). It supports large-scale operations with robust infrastructure and customizable workflows. Enterprises benefit from dedicated support and guaranteed service-level agreements (SLAs). Collaboration is improved through advanced code review and project management tools, and flexible deployment options include cloud-hosted, self-hosted, and hybrid setups.</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXe_-R0Auha-Ti-OktSDSd7CW34qdCkgoBP2lTcu3LU9F1vuuLzGIdTQHQh5XyJitKZzK6HTq2l4ja28U_AQoCL4FbECJZHevCseSCwNA27Rsi_WC6H3IPjAjHx5huY00JPmChAPVq3PBumzgP7I2jG9nW4?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="624" height="305"></figure><p><br></p><p><strong>Github Single sign-on (sso)</strong></p><p>GitHub SAML Single Sign-On (SSO) for enterprise cloud solution by Instasafe provides secure <a href="https://www.miniorange.com/products/single-sign-on-sso?ref=instasafe.com">Single Sign-On </a>access to GitHub &amp; multiple On-Premise and Cloud Applications using a single set of login credentials. With Instasafe IDP service you can SSO login to multiple applications using a single Github username and password. Github Single Sign-On (SSO) can also be enabled if your users are in any of the third-party <a href="https://www.miniorange.com/iam/login-with-external-idp/?ref=instasafe.com">Identity Providers</a> and you want your users to log into Github using existing IdP credentials, you can easily allow them to SSO into Github in a secure manner.</p><p><strong>With Instasafe github SSO, you can</strong></p><ul><li>Enable your users to automatically login to Github</li><li>Have centralized and easy access control of the users</li><li>Connect easily with any external identity source like Azure AD, LDAP.</li></ul><p><strong>Supported SSO features</strong></p><p>Instasafe Github SAML integration supports the following features:</p><ul><li><strong>SP Initiated SSO Login: </strong>Users can access their Github account via a URL or bookmark. They will automatically be redirected to the Instasafe portal for login. Once they&apos;ve signed on, they&apos;ll be automatically redirected and logged into Github.</li><li><strong>IdP Initiated SSO Login:</strong> Users need to login to the Instasafe first , and then click on the Github icon on the applications dashboard to access Github.</li></ul><h2 id="step-by-step-guide-given-below-for-github-saml-single-sign-on-sso-for-your-organization"><strong>Step-by-step guide given below for GitHub SAML Single Sign-On (SSO) for your organization</strong></h2><p></p><p><strong>Configure github in Instasafe:</strong></p><ul><li>Login to the Instasafe Admin Console.</li><li>Go to the IDP section in Identity management.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfDaUsTi2XhvwP0PZuWvnqiWjwlBNy_S1zeduMVnxG5zyEw67hinuoqrXJQBjcrAVCY2X_ItzjoFCm7_gvqGDsUUsGq-9YtvGgaiMZ2bxcZOLT9iio75Wn_ObYeE77EWQu7ksaacj-3nOKhZq_LGvlFMTOy?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="565" height="103"></figure><ul><li>In choose IDP, select the application type as SAML.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXdId60joIPiclz0aN89yIOt9cJxCIry0uCmVR7rbn2I6OSsgo2gUwMNz66LBLW0bGj9Fwa7z3AZl08BSATgvXO3Jfegyx7RCOvcUfBCadNaKHIha6ajtBiooxj5BeQwm0dMLwm8IBAOQ5Rrp1XHhrTSEOSA?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="567" height="305"></figure><ul><li>&#xA0;Enter <strong>IDP Name</strong> as <strong>GitHub</strong>.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfFr7OdHNNWnDnX7o8i1RRGJMhGb5g5MoAZUfL5Caon7rlFLX7mLVvyxapHNpmTt5bW3iJncqBDfo1o8ZLGNY8FF8fmUWJZX51WlS6GsoPw6nXLORbIGeucI3hBu-H-kPESIm2b-rC7zJxReL-FZkMRD0jK?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="536" height="268"></figure><ul><li>Enter the <strong>SP Entity ID</strong> or <strong>Issuer :</strong> <strong>https://github.com/enterprises/&lt;custom_domain_name&gt;</strong></li><li>Enter the <strong>ACS URL :</strong> <strong>https://github.com/enterprises/&lt;custom_domain_name&gt;/saml/consume</strong></li><li>Enter the<strong> IDP entity </strong>ID&#xA0;</li><li>Click on Next to proceed further.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeIQSKnmmLwhBMtjgCtaxCA9z6s4ctq-3zjNk6jhzutMCyOInBg9Kza2nS20SRNUXJ0m8c-WFbD-7l1VIZZe4RrdxRd6ITGZldeE6hBaq49Iw6dBUvU8EAFTjHDvjPc2XaRTdkVtNoYHpc2b0fSmMXGOw2k?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="561" height="290"></figure><ul><li>&#xA0;&#xA0;In the <strong>Attribute Mapping</strong> tab configure the following attributes as shown in the image below.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXc3f_AvPFTXyk8Rc1wxHud2nOFOoA5tGnp_2dgmIz_o5QrrA4YG172YrtEekV85Xn2jKszZH2YJzGMAJcy_pWWbwoG3ooXPZnmJytBYRly50mmQx2IEfUrnuQxElqF4W3EWjwatxNMArlJyFd7NJcSORRfd?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="578" height="270"></figure><p>&#xA0;<strong>Application set up in Instasafe console</strong></p><ul><li>In the instasafe admin console.</li><li>Go to applications in perimeter management.</li><li>Create the github application and add the logo if needed.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfMGZhjFSixYIuhL0sC032QoWBVDLKPxUK7I9meAw9sVGZfFLTG7PjLMtJvvgqq46KhE00XSui45amWMYQhGtnpfcDrmc-dzwQLGLhjgFCrquGxG0SncHnbZgUyqU_hbaxmRY5O47qQMR69-zq0HXrwQeE?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="586" height="236"></figure><p><strong>&#xA0;Set up the Access policy for the application access</strong></p><ul><li>In the access policy create an policy for github access</li><li>Enter the policy name</li><li>Choose the expiry date as per requirement.</li><li>Click on the next button</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXe1hyToTc0Tud9SyfPYd-VJt7kG3zKsP0ny80XxDw-8x2b9H03bUb0g7G-cMc79RRD1xzIPAfukLgx86ANZh_H1Lu494-bFbHz6zmp3d-6O0xwNl2lLFrl4y-RyLDQ0QcCb0NRSNebm7FI_ZPUwlYCrSSql?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="550" height="232"></figure><ul><li>Click on the add button and add the user or user group to whom you want to give access to the github application.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXchywEsW7nWhx3CSOuyWjkHIa7OtR6iBiFsYGEFXQ34duO9iyjcWRn9uyNPeVr50Vj-mThv1NK2rm927Skk2pCgxbiftwo2pU676VmYmLzfZ0n6bEZyJKivVJgHKjVIYcB8OILW5s9RDUrCrWRyH_4WO10U?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="569" height="249"></figure><ul><li>&#xA0;Add the github application.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXci7AqAKmA_eah07XH1ulE5GO71-dbuxM1SMjzenOqo4acGqXagJjhwfzV3gzpM6Ja2fJlRNHZbjDJAe0yd__GYlJBKo6Nae4a7NLZieYJm-7YVxOL5ByM9GhHxq_PD7Xo_dLCVeLJLmsU6Bqz7jSMvtUY?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="581" height="224"></figure><ul><li>&#xA0;Save the access policy</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcm6x3hQ3lXLaqCJB4sc3koycY_9VSH0fC_tVO8MypnH5I7DFSiEIe3GiOOepoRJ8TnMR6XoKIflLK90U7kFgko9u2IgasFYDRjXxX564onDtNZ368Z3_qiFVtxlU6q9x5LlFiS56irSo6MN54jGw9Mh0nj?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="546" height="226"></figure><p><br><strong>Configure SSO in github enterprise</strong></p><ul><li>Navigate to the top right corner of <a href="https://github.com/?ref=instasafe.com">GitHub</a>.</li><li>Click your profile photo &gt;&gt; then click your Enterprises.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXfIf0MoK1FreX6DXP9iPf6Pk8apV_HLF1qIICyc_FnsGrQtMMiUNQjq9-50veUpyHZW4VVWjnDvCgSc2R1b6x_0oWO6GDDoAcPUbBwlbFxsU6byThEGkzKlHbeAbMsWXFf9DSS5YkN6sMYyV3yU7fBFuwCB?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="357" height="352"></figure><ul><li>In the Enterprises account sidebar, click on&#xA0; Settings &gt;&gt; Authentication security.</li><li>Under SAML single sign-on, enable the checkbox Require SAML authentication.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXc0f04SFeVLos5IDV4HedwH56YR7gr9ctLqf1bpZFPtZuKFWAyuh5Drgm07S4s_QlgHCYSXz2gaGmHillEGsWBBUiRG0Nxds_IVHkK-fQvXTb5vawVU5AWA87CP8l0_rfkKJudaE9wiPam_GC-53lCPze7K?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="505" height="207"></figure><ul><li><strong>&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;</strong>&#xA0;Enter the required details. </li></ul>
<!--kg-card-begin: html-->
<table style="border:none;border-collapse:collapse;"><colgroup><col width="170"><col width="466"></colgroup><tbody><tr style="height:38.74851790771484pt"><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;background-color:#f9f9f9;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Sign on URL</span></p></td><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;background-color:#f9f9f9;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Enter the SAML Login URLs for single sign-on requests.</span></p></td></tr><tr style="height:46.99703581542968pt"><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Issuer</span></p></td><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Enter the IdP Entity ID or Issuer. This verifies the authenticity of sent messages.</span></p></td></tr><tr style="height:47.25pt"><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;background-color:#f9f9f9;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Publi certificate</span></p></td><td style="border-left:solid #dddddd 0.75pt;border-right:solid #dddddd 0.75pt;border-bottom:solid #dddddd 0.75pt;border-top:solid #dddddd 0.75pt;vertical-align:top;background-color:#f9f9f9;padding:6pt 6pt 6pt 6pt;overflow:hidden;overflow-wrap:break-word;"><p dir="ltr" style="line-height:1.714284;margin-left: 18pt;text-indent: -18pt;margin-top:0pt;margin-bottom:23pt;padding:0pt 0pt 0pt 18pt;"><span style="font-size:10.5pt;font-family:Arial,sans-serif;color:#333333;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;">Paste the X.509 Certificate to verify SAML responses</span></p></td></tr></tbody></table>
<!--kg-card-end: html-->
<ul><li>Under public certificate, to the right of the current signature and digest methods, click on&#xA0; edit.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXflcbyF5MZ5lpSHAqXJCRLTCmZdBgQnyf_yL5OUcr_6eLmrtWQOuITUbNuZcU71hivtI5FknQjDzOaKWtj0imF9UPriHRK56DQQPqzobhvcJwWnaE5XuOJ2SE0egyuw4ZJZ7Ncq4KT6EcfByoqsPVqUyxkk?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="568" height="64"></figure><ul><li>Select the Signature Method and Digest Method from the dropdown, then click the hashing algorithm used by your SAML issuer.</li><li>Before saving SAML SSO for your enterprise, click Test SAML configuration to ensure that the information you&apos;ve entered is correct.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcYVSgQceVEunq1qVybMEov1f8oVJ-dG0_DsJJvhFXJwrfzPp9YBkcTAnjLdSGiXiwGoIgGZvaIVt6P5C-bV4v8utPSxVxweLyPa8YIwM2AMc1C53JF6AD-3Jz6aPAExl6JRSdpiseH_f-3__Dg2932HgTG?key=GHf9oXceMNohEHWbikNgzw" class="kg-image" alt="Secure Access for GitHub" loading="lazy" width="624" height="360"></figure><ul><li>Click Save SAML settings.</li></ul><h2 id="3-enabling-logging-and-monitoring">3. Enabling Logging and Monitoring</h2><h3 id="a-enable-auditing">a. Enable Auditing</h3><p>Auditing logs are crucial for tracking and investigating security incidents. GitHub provides auditing features to log important events such as login attempts, changes to user permissions, and modifications to critical settings.</p><h3 id="b-monitor-user-activity">b. Monitor User Activity</h3><p>Monitoring user activity helps in identifying unusual or unauthorized actions. Implement monitoring tools that provide insights into user behavior and alert you to potential security threats.</p><h2 id="4-integrating-with-instasafe-for-enhanced-security">4. Integrating with InstaSafe for Enhanced Security</h2><h3 id="a-single-sign-on-sso">a. Single Sign-On (SSO)</h3><p>InstaSafe Secure Access enables seamless and one-click access to GitHub applications using Single Sign-On. With SSO, users authenticate once and gain access to multiple applications without needing to sign in repeatedly. This not only enhances user convenience but also improves security by reducing the risk of password fatigue.</p><h3 id="b-multi-factor-authentication-mfa">b. Multi-Factor Authentication (MFA)</h3><p>MFA provides an additional layer of security by requiring users to verify their identity through multiple methods such as OTP, T-OTP, push notifications, biometric verifications, or hardware tokens. This reduces the risk of unauthorized access due to compromised passwords.</p><h3 id="c-device-authentication">c. Device Authentication</h3><p>InstaSafe ensures that only authorized and compliant devices can access your GitHub instance. By enforcing device authentication, you significantly reduce the chances of data breaches and ensure that only the right users with the right devices are accessing your application.</p><h2 id="benefits-of-instasafe-secure-access-for-github">Benefits of InstaSafe Secure Access for GitHub</h2><h3 id="1-granular-access-controls">1. Granular Access Controls</h3><p>InstaSafe allows you to provision users or user groups based on their roles, determining who can access specific applications. This granular control enhances security by ensuring that only authorized personnel can access sensitive information.</p><h3 id="2-complete-visibility">2. Complete Visibility</h3><p>Gain complete visibility of user activity with InstaSafe&#x2019;s detailed insights. This visibility helps in monitoring user behavior, detecting anomalies, and improving overall security posture.</p><h3 id="3-enhanced-security-with-seamless-user-experience">3. Enhanced Security with Seamless User Experience</h3><p>By integrating MFA and SSO, InstaSafe provides an enhanced security layer while maintaining a seamless user experience. Users enjoy easy access without compromising on security.</p><h3 id="4-easy-to-deploy">4. Easy to Deploy</h3><p>InstaSafe Secure Access can be set up in minutes, making it easy to get started. The straightforward deployment process ensures that your GitHub instance is quickly secured without extensive configuration.</p><h2 id="conclusion">Conclusion</h2><p>Securing your GitHub application is crucial to protecting your code and sensitive information. By implementing strong user access controls, network security measures, and leveraging InstaSafe&#x2019;s Secure Access solution with SSO and MFA, you can ensure that your GitHub instance remains secure, user-friendly, and protected from potential threats.</p>]]></content:encoded></item><item><title><![CDATA[Secure Access for Jira]]></title><description><![CDATA[With InstaSafe, enterprises can now provide users with secure access to Jira using InstaSafe Single Sign On (SSO) and Multi Factor Authentication (MFA)]]></description><link>https://instasafe.com/solutions/secure-access-for-jira/</link><guid isPermaLink="false">66680d216764ff036a724a0f</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Tue, 11 Jun 2024 09:20:21 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/06/Jira--InstaSafe-.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/06/Jira--InstaSafe-.png" alt="Secure Access for Jira"><p>With InstaSafe, enterprises can now provide users with secure access to Jira using InstaSafe Single Sign On (SSO) and Multi Factor Authentication (MFA)</p><p>As organizations increasingly rely on Jira for project management and issue tracking, ensuring the security of this critical application becomes paramount. This article explores various methods to secure access to your Jira instance, emphasizing Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other best practices to safeguard your data.</p><h2 id="introduction-to-jira-security">Introduction to Jira Security</h2><p>Securing your Jira application involves implementing several layers of protection. These include managing user access, configuring network security, enabling logging and monitoring, and integrating with security tools. Let&apos;s delve into these strategies to enhance the security of your Jira environment.</p><h2 id="1-managing-user-access">1. Managing User Access</h2><h3 id="a-use-strong-password-policies">a. Use Strong Password Policies</h3><p>Implementing strong password policies is the first step in securing user accounts. Ensure all users follow best practices for password creation:</p><ul><li>Use a mix of upper and lower case letters, numbers, and special characters.</li><li>Avoid common passwords and patterns.</li><li>Change passwords regularly and avoid reuse.</li></ul><h3 id="b-enable-two-factor-authentication-2fa">b. Enable Two-Factor Authentication (2FA)</h3><p>Two-Factor Authentication adds an additional layer of security by requiring users to provide a second form of verification. Jira supports 2FA through various methods such as SMS, authenticator apps, and hardware tokens.</p><h3 id="c-implement-role-based-access-control-rbac">c. Implement Role-Based Access Control (RBAC)</h3><p>Jira&apos;s RBAC allows you to assign roles to users based on their responsibilities. By limiting access to certain functionalities, you can minimize the risk of unauthorized actions:</p><ul><li><strong>Viewer:</strong> Can view projects and issues.</li><li><strong>Reporter:</strong> Can create and view issues but cannot modify them.</li><li><strong>Developer:</strong> Can work on issues but cannot manage project settings.</li><li><strong>Admin:</strong> Can manage project settings and user permissions.</li></ul><h2 id="2-configuring-saml-sso-for-jira">2. Configuring SAML SSO for Jira</h2><p>SAML for single sign-on (SSO) allows your customers&#xA0;to authenticate through your organization&apos;s identity provider when they&#xA0;log in to your Jira Service Management help center. Customers only need to log in one time to access multiple portals for one help center during an active session.</p><p>For detailed configuration, please refer this <a href="https://support.atlassian.com/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/?ref=instasafe.com" rel="noreferrer">LINK</a></p><h2 id="3-enabling-logging-and-monitoring">3. Enabling Logging and Monitoring</h2><h3 id="a-enable-auditing">a. Enable Auditing</h3><p>Auditing logs are crucial for tracking and investigating security incidents. Jira provides auditing features to log important events such as login attempts, changes to user permissions, and modifications to critical settings.</p><h3 id="b-monitor-user-activity">b. Monitor User Activity</h3><p>Monitoring user activity helps in identifying unusual or unauthorized actions. Implement monitoring tools that provide insights into user behavior and alert you to potential security threats.</p><h2 id="4-integrating-with-instasafe-for-enhanced-security">4. Integrating with InstaSafe for Enhanced Security</h2><h3 id="a-single-sign-on-sso">a. Single Sign-On (SSO)</h3><p>InstaSafe Secure Access enables seamless and one-click access to Jira applications using Single Sign-On. With SSO, users authenticate once and gain access to multiple applications without needing to sign in repeatedly. This not only enhances user convenience but also improves security by reducing the risk of password fatigue.</p><h3 id="b-multi-factor-authentication-mfa">b. Multi-Factor Authentication (MFA)</h3><p>MFA provides an additional layer of security by requiring users to verify their identity through multiple methods such as OTP, T-OTP, push notifications, biometric verifications, or hardware tokens. This reduces the risk of unauthorized access due to compromised passwords.</p><h3 id="c-device-authentication">c. Device Authentication</h3><p>InstaSafe ensures that only authorized and compliant devices can access your Jira instance. By enforcing device authentication, you significantly reduce the chances of data breaches and ensure that only the right users with the right devices are accessing your application.</p><h2 id="benefits-of-instasafe-secure-access-for-jira">Benefits of InstaSafe Secure Access for Jira</h2><h3 id="1-granular-access-controls">1. Granular Access Controls</h3><p>InstaSafe allows you to provision users or user groups based on their roles, determining who can access specific applications. This granular control enhances security by ensuring that only authorized personnel can access sensitive information.</p><h3 id="2-complete-visibility">2. Complete Visibility</h3><p>Gain complete visibility of user activity with InstaSafe&#x2019;s detailed insights. This visibility helps in monitoring user behavior, detecting anomalies, and improving overall security posture.</p><h3 id="3-enhanced-security-with-seamless-user-experience">3. Enhanced Security with Seamless User Experience</h3><p>By integrating MFA and SSO, InstaSafe provides an enhanced security layer while maintaining a seamless user experience. Users enjoy easy access without compromising on security.</p><h3 id="4-easy-to-deploy">4. Easy to Deploy</h3><p>InstaSafe Secure Access can be set up in minutes, making it easy to get started. The straightforward deployment process ensures that your Jira instance is quickly secured without extensive configuration.</p><h2 id="conclusion">Conclusion</h2><p>Securing your Jira application is crucial to protecting your project data and maintaining the integrity of your workflows. By implementing strong user access controls, network security measures, and leveraging InstaSafe&#x2019;s Secure Access solution with SSO and MFA, you can ensure that your Jira instance remains secure, user-friendly, and protected from potential threats.</p>]]></content:encoded></item><item><title><![CDATA[Secure Access for Gitlab]]></title><description><![CDATA[Implement additional layer of security with Single Sign On (SSO) and Multi-Factor Authentication to secure your self managed Gitlab code repository]]></description><link>https://instasafe.com/solutions/secure-access-for-gitlab/</link><guid isPermaLink="false">6666c5946764ff036a7249c9</guid><category><![CDATA[Secure Access for Web Applications]]></category><dc:creator><![CDATA[Instasafe]]></dc:creator><pubDate>Mon, 10 Jun 2024 09:56:07 GMT</pubDate><media:content url="https://instasafe.com/solutions/content/images/2024/06/Gitlab---InstaSafe.png" medium="image"/><content:encoded><![CDATA[<img src="https://instasafe.com/solutions/content/images/2024/06/Gitlab---InstaSafe.png" alt="Secure Access for Gitlab"><p></p><h2 id="securely-access-your-gitlab-repo-with-instasafe-sso-and-mfa">Securely Access Your Gitlab repo with InstaSafe SSO and MFA</h2><p>Implement additional layer of security with InstaSafe Single Sign On (SSO) and Multi-Factor Authentication to secure your Gitlab code repository</p><h2 id="understanding-gitlab-application">Understanding Gitlab Application</h2><p>GitLab is an open-source web-based DevOps lifecycle management tool that provides a Git repository manager for managing source code repositories, version control, and DevOps lifecycle with features like issue tracking, CI/CD (Continuous Integration/Continuous Deployment), and more.</p><h2 id="current-challenges-with-secure-access-for-gitlab-application">Current Challenges with Secure Access for Gitlab Application</h2><ul><li><em>Risk of unauthorized access by outsider</em>- Gitlab repositories often contain proprietary source code and other confidential information such as user credentials, API keys and other configuration files. Provisioning direct access to Gitlab repository over internet can have pertinent risks of unauthorized access. </li><li><em>Risk of unauthorized access by insider - </em>In case a employee leaves the organization, often the IT admin forgets / take few additional days to remove the access. The departing employee can have access to gitlab repository posing significant risks</li><li><em>Lack of strong authentication mechanism </em>- Current authentication methods involve password as primary authentication and OTP as secondary authentication (which is optional). </li></ul><h2 id="with-instasafe-secure-access-for-gitlab-you-can">With InstaSafe Secure Access for Gitlab, You can</h2><ul><li><em>Hide your applications from public internet with self managed Gitlab deployment</em></li></ul><p>Self managed Gitlab instance will only be accessed through InstaSafe agent after the user is authenticated and provisioned. Gitlab instance will not be available to access through direct URL thereby eliminating any risks of data breach.</p><ul><li><em>Seamless and one-click access of Gitlab applications using Single Sign-On (SSO)</em></li></ul><p>With Single Sign-On, gets authenticated once and seamless access application. No need to sign in frequently and remember different credentials for different applications.&#xA0;</p><ul><li><em>Multi-factor authentication (MFA) for additional security</em></li></ul><p>Use additional authentication methods such as OTP, T-OTP, push notifications, Biometrics notifications, Hardware token to eliminate the risks arising from password breaches</p><ul><li><em>Enforce device authentication to ensure only authorized device gets access</em></li></ul><p>Ensure only authorized and compliant devices provided by organization is able to access to application after proper authentication. Device identity is key to significantly reducing the chances of data breaches and ensuring right user with right device is accessing application</p><p>Once InstaSafe SSO is configured, here is the scenario for accessing self managed Gitlab without / with InstaSafe</p><h2 id="step-by-step-guide-for-configuring-saml-single-sign-on-for-self-managed-gitlab">Step by Step Guide for configuring SAML Single Sign On for Self Managed Gitlab</h2><p></p><p><strong>Cloud provider for hosting Gitlab</strong></p><p>Various cloud providers, including AWS, Google Cloud Platform, Microsoft Azure, DigitalOcean, and others, offer robust infrastructure options for deploying self-hosted GitLab instances. Each provider supports scalable virtual machines, managed databases, and Kubernetes services, providing flexibility and customization for organizations seeking control over their DevOps environments.</p><p><br><strong>AWS</strong></p><p>To set up GitLab on AWS following your specifications, here&apos;s a step-by-step explanation:</p><p><strong>Instance Selection</strong>: Choose an appropriate instance type depending on your usage requirements, such as r6i.large. This instance type provides sufficient resources for GitLab&apos;s operations.</p><p><strong>VPC and Subnet Configuration</strong>:</p><ul><li>Ensure you have a Virtual Private Cloud (VPC) set up in AWS.</li><li>Choose an availability zone within your preferred region for high availability.</li><li>Select a subnet within the chosen VPC and availability zone where the GitLab instance will reside.</li></ul><p><strong>Elastic IP Configuration</strong>:</p><ul><li>Allocate an Elastic IP (EIP) address to your instance to ensure a static public IP that persists even if the instance is stopped and restarted.</li></ul><p><strong>Security Group Configuration</strong>:</p><ul><li>Create or modify a security group to allow inbound traffic on ports 443 for GitLab access via InstaSafe ZTAA.</li><li>Configure outbound rules to allow all traffic from the instance to communicate with external services and repositories.</li></ul><p><strong>Instance Launch and Setup</strong>:</p><ul><li>Launch the instance with the chosen specifications (instance type, subnet, security group).</li><li>Connect to the instance using SSH or AWS Systems Manager Session Manager.</li></ul><p><strong>GitLab Installation and Configuration</strong>:</p><ul><li>Update the instance and install the necessary packages (e.g., Docker, GitLab dependencies).</li><li>Follow GitLab&apos;s official installation guide or use Docker to deploy GitLab.</li><li>Configure GitLab settings, including domain name configuration, SSL certificates (using Let&apos;s Encrypt or your own certificates for HTTPS access), and GitLab administrative settings.</li><li>Set up repositories, users, and permissions as per your organization&apos;s requirements.<br></li></ul><p>Once GitLab is successfully hosted on AWS or any other cloud provider, the administrator can proceed to configure access via the InstaSafe portal with the following steps:</p><ul><li>In the perimeter management navigate to applications and create a gitlab application and give the self hosted gitlab url.</li><li>Save the configuration settings for the GitLab application.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXd8mvgo5aaxwixJDwObx2IF-UbyncmXoOheTA6EWEae_65upGzYIyZ7kTN4Zy1vNUxGs-CWvLwusyGNT_PBC0l86Jsgpt19KHRptMnDKqxFKDch6BvlG05uMY-YGKh_WkQyk_5mBDKdAsbHkwk_z_9c9nQd?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="624" height="265"></figure><ul><li>Navigate to the &quot;Access Policy&quot;.</li><li>Create a new policy specifically for GitLab access.</li><li>Add the relevant users or user groups who require access to GitLab.</li><li>Include the GitLab application within the application configuration.</li><li>Update and save the policy settings to apply the access controls.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXf4PfIaZg8y4semUurj25OJYXs9n9YqANGjHZWuVEGwGAMYZ_FN7zTO3Vb4DvnC7mgiWgM2cz2W3678XmZFmtfJ8Fd052X4xtwKaZSC6bqA4xucLkRJru8t8yUFJCuC8E8nIK0EsSs1x9HiXCM8SbMr-BwC?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="624" height="248"></figure><ul><li>Add the application behind the gateway in InstaSafe portal.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXc1vWOVRwBuOMFe0_Y04jhw8lRdP9iAeR7MEV48ut_IlAA9OHekxkBWru34DH7u5F-RuZH9wJQLgsFfBZWXYigAzpR5h48bi-oGnjQ3nQOLi4rLhi4Yju_xwV4XCpYTrNgjIFssUTr1G7QHAEcxFA-5MHk?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="624" height="257"></figure><ul><li>Once the setup in the portal is done.</li><li>The user can go to the self hosted Gitlab page and can login to Gitlab using the InstaSafe Single Sign On.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXeGb08cZcuWrgl2Wt2jdK7kQB0KKjEduG_f1PLV-EuTjzALw35fzAlWvn2QP_Yyb0afmNT0T98er6XdEtB5DcFwKM6VnMSp8mnyYBVFQahf-vXr0wMz05ce42epypbfLqA9x1IApeQFicJFgYmcC8i8PhA?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="624" height="287"></figure><ul><li>The user can connect to the InstaSafe ZTAA agent and access the gitlab.</li></ul><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXc95-srJcqGywp601-yV0ptAZlHSIIBv2WsgQ1trw2CveVOJcuOwAKbVdIEYQBuJyo0PN3lDo_YtpQvdPTMzTTjQvl5NtwNaAmPA9cCqAjge_nnm-77hI1QKLfr1fsOjLyBDbZkB8V6MIZqVomz-XBZXCuZ?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="306" height="445"></figure><p></p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcewT2I7Qe3LfxySKDoaeowLHjJJ5ZsqdaiLoEFUbso82ucfmUiLsH4fzUKbKr06nIOdmNHYT_wArlRjJAdK3TGcxZtARFn6-Jb_qUuGTxkdTL-2ltzfKUE1Dd2szlWMgDCpal1qwxbQznNQEqJe1y2ZT5G?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="624" height="213"></figure><p><br>When the agent is disconnected, the user will not be able to access the gitlab.</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/docsz/AD_4nXcIa0-SSLx_C1xbmVIPZXFCHnwE8vKmerX0kBa8tin2W73xGRiVb5oYuhOxPkGr8Ns5_ajOCcAmwwa6mLCMI9NBvhbFCzuj8f44RGUdhidCrtJD7tN0dDXcYUo3kiL2XURmSqdrBflZWGuegdGA_G1NxI73?key=5gdHabyF6d4f77uBgWUtXQ" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="382" height="426"></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://instasafe.com/solutions/content/images/2024/06/image-1.png" class="kg-image" alt="Secure Access for Gitlab" loading="lazy" width="1345" height="812" srcset="https://instasafe.com/solutions/content/images/size/w600/2024/06/image-1.png 600w, https://instasafe.com/solutions/content/images/size/w1000/2024/06/image-1.png 1000w, https://instasafe.com/solutions/content/images/2024/06/image-1.png 1345w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Directly accessing Gitlab from Browser</strong></b></figcaption></figure><p>Above image shows that after SSO configuration, directly accessing self managed Gitlab instance is not possible directly from the browser. Only using InstaSafe agent and accessing through InstaSafe secure browser, Gitlab instance is accessible</p><p></p><h2 id="benefits-of-instasafe-secure-access-for-gitlab">Benefits of InstaSafe Secure Access for Gitlab</h2><ul><li><strong>Granular Access controls</strong> - Provision user or user groups based on their role on who can access </li><li><strong>Complete visibility&#xA0;</strong>- Get complete visibility of user activity for better insights</li><li><strong>Better Security - </strong>MFA and SSO provides enhanced security with seamless user experience</li><li><strong>Easy to Deploy - </strong>Secure Access can be set up in minutes and easy to get started.</li></ul><h2 id="complement-our-other-solution-stack"><strong>Complement our other Solution Stack</strong></h2><p><strong>Single Sign On</strong>: Validation and Authentication from a single dashboard, using a single set of credentials, gives you access to all authorized applications, whether on-premise or on the cloud</p><p><strong>Multi Factor Authentication</strong>: Add additional layer of authentication with OTP, T-OTP, PIN, Biometrics or push notification.</p><p><strong>Contextual Access</strong>: Leverage IP based Access, Time based Access, Geolocation based access and Device based access for added flexibility and agility </p><p><strong>Secure Identity Cloud</strong>: Comprehensive identity and access management solution to manage and control access to digital resources</p><p>To book a demo, please visit <a href="https://instasafe.com/book-a-demo?ref=instasafe.com">https://instasafe.com/book-a-demo</a></p><p></p><p></p>]]></content:encoded></item></channel></rss>