Audience

Anyone looking for a remote browsing solution

About Cigloo Browser Isolation Management Platform

Cigloo Browser Isolation Management Platform acts as a web proxy between corporate users and the virtual technology environment. Cigloo can be implemented internally or on the cloud. Cigloo controls and isolates any web content execution using an advanced rule engine, determining where the web content is anonymously executed and which browser is used, based on user privileges, location and the requested website.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Cigloo
Founded: 2017
Israel
cigloo.io

Videos and Screen Captures

Cigloo Browser Isolation Management Platform Screenshot 1
Other Useful Business Software
Cut Cloud Costs with Google Compute Engine Icon
Cut Cloud Costs with Google Compute Engine

Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
Try Compute Engine

Product Details

Platforms Supported
Cloud
Training
Live Online
Support
Online

Cigloo Browser Isolation Management Platform Frequently Asked Questions

Q: What kinds of users and organization types does Cigloo Browser Isolation Management Platform work with?
Q: What languages does Cigloo Browser Isolation Management Platform support in their product?
Q: What kind of support options does Cigloo Browser Isolation Management Platform offer?
Q: What type of training does Cigloo Browser Isolation Management Platform provide?

Cigloo Browser Isolation Management Platform Product Features

IT Security

Email Attachment Protection
Event Tracking
Web Threat Management
Web Traffic Reporting
Anti Spam
Anti Virus
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting
Compliance Reporting