The iboss cloud includes detailed logging and
reporting that provides clear visibility into cloud
use to reduce infections and gain insight
regardless of user location
The platform includes detailed logs that include username, device name, group, source IP address, URL, timestamp and a large number of attributes needed to correlate cloud use information to specific users and devices. This allows IT administrators to quickly locate problems such as infected devices or risky users which results in faster remediation and less downtime. The logs are stored in iboss cloud and automatically backed up to ensure data is always available when needed while eliminating the need for tape backup to preserve web logs.
In addition, detailed drill down reports contain information that can be presented to executives, human resources, and IT security teams on demand or on a schedule. The reports can be customized including what content should be included in the report. Customized content can include top users by activity, infections, blocked malware in addition to dozens of other specific data. Reports are downloadable or can be sent via email in PDF format either on demand or on a schedule.
Reporting data can be streamed directly from iboss cloud to any external SIEM or logging database to ensure existing logging databases are leveraged. This includes preserving existing processes and teams already designed around existing SIEM platforms. Since the iboss cloud protects user Internet access from anywhere, including out of the office, security operations teams will gain additional visibility into activity typically not available when users are outside of the office. Detailed log events including username, device name and timestamp The iboss cloud will generate log events for user cloud activity regardless of location. This includes data from users in and out of the office since the iboss cloud protects users wherever they roam. The log events are detailed and includes a large number of fields including username, device name, URL and timestamps. They can be searched with very specific criteria to locate specific events and incidents. Log events