Cybercrime attacks rely on access to a remote server. NetSTAR is in a unique position to provide both inbound and outbound URL protection by preventing access or blocking malicious communications.
NetSTAR has enhanced the inCompass SDK by speficially addressing the growing changes of the mobile computing environment, including smart phones, tablets, and mobile other mobile computing devices.
A cloud based DNS service significantly decreases the time and complexity of integrating a URL Content Filtering service into software or hardware based security products and offerings. The DNS style service enables current cloud based service suppliers to expand their offerings to include Internet Content Filtering or Parental Controls with limited engineering efforts.
inCompass SDK for OEMs significantly out-performs competitive solutions both in url lookup speed and number of lookups per second.
Policy based user management can be configured and controlled in the inCompass Cloud, which provides for a full policy management solution. An api interface is available that allows device management from an OEM vendors own solution.
InCompass® Cloud is the only 4th generation content filter in the market, providing a complete Cloud based-solution that offers URL Filtering, web-based security, as well as full group and user/device level policy management.
With today’s announcement, inCompass® has the unique ability to customize the intregration of the inCompass SDK to tailor specific deployment requirements around OEM partners requirements and system configurations.
Auto-detection of an language helps NetSTAR accurately categorize new website content and stream-line the human review process, when necessary, by sending previously uncategorized sites for content review to NetSTAR’s staff member that is fluent in the language of the website.
Is your old OEM web filtering partner now in competition with you due to an acquisition? inCompass makes it easy to switch OEM vendors.
There is a growing need to ensure the security of these mobile devices in the same way that office computers are secured, to prevent their loss, misuse by employees, and accessing websites that are potential security risks.