Audience

Anyone looking for a remote browsing solution

About Cigloo Browser Isolation Management Platform

Cigloo Browser Isolation Management Platform acts as a web proxy between corporate users and the virtual technology environment. Cigloo can be implemented internally or on the cloud. Cigloo controls and isolates any web content execution using an advanced rule engine, determining where the web content is anonymously executed and which browser is used, based on user privileges, location and the requested website.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Cigloo
Founded: 2017
Israel
cigloo.io

Videos and Screen Captures

Cigloo Browser Isolation Management Platform Screenshot 1
Other Useful Business Software
Gemini 3 and 200+ AI Models on One Platform Icon
Gemini 3 and 200+ AI Models on One Platform

Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free

Product Details

Platforms Supported
Cloud
Training
Live Online
Support
Online

Cigloo Browser Isolation Management Platform Frequently Asked Questions

Q: What kinds of users and organization types does Cigloo Browser Isolation Management Platform work with?
Q: What languages does Cigloo Browser Isolation Management Platform support in their product?
Q: What kind of support options does Cigloo Browser Isolation Management Platform offer?
Q: What type of training does Cigloo Browser Isolation Management Platform provide?

Cigloo Browser Isolation Management Platform Product Features

IT Security

Email Attachment Protection
Event Tracking
Web Threat Management
Web Traffic Reporting
Anti Spam
Anti Virus
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting
Compliance Reporting