SAM Network Visibility

SAM Secure Office

Meeting the security
needs of the modern
workplace

SMBs are faced with similar security challenges as enterprises. Become their automated CISO with a lean yet enterprise-grade cyber security solution that secures and manages SMB networks and connected devices.

Raising the bar for
small business security

The management dashboard offers an overview
of key information and insights about the customer’s network
and it’s also the primary screen of the provided user interface.

Business
Security Suite

SAM Secure Office is powered by the Business Security Suite. Businesses can now detect malicious behavior and mitigate potential threats without disturbing user experience. By stacking up enterprise-level security features such as dynamic firewall configuration, metadata inspection and anomaly detection, SAM Secure Office constantly monitors business networks and prevents them from falling victim to malicious attacks.

Network Monitoring

Continuously monitors network activity and enables users to filter content either by security and network trends, or by a specific security risk.
ic_Vulnerability-svg

Vulnerability
Assessment Tool

A cloud-based vulnerability scanner that finds cyber security weaknesses in devices across business networks and provides meaningful action items for them resolving them. By using the listed recommendations, your customers can better secure their network and reduce their risk.

Virtual Patching

Detects zero-day vulnerabilities, and applies protection on a per device basis, giving greater granularity and control over blocked vulnerabilities.

Device
Fingerprinting

Offer SMBs high visibility into their network with the ability to identify and manage all connected devices. With SAM’s device fingerprinting, businesses can define appropriate security settings for each device using network maps and assigning them to customized zones: Office, Guest, IoT, and Blocked.

intuitive network map

Map vulnerabilities

Segmented network
zones

Employee
Management Profiles

Filter unwanted content per employee profile across all devices to ensure safe browsing within your business network.

Businesses can report on system status, filtering either through individual employees or the entire network.

Suspend internet access
according to your preferences

Isolate employee devices in
segmented network zones

Customize employee profiles

SAM by the numbers

It all comes
down to impact
1 M

devices covered worldwide

1 %

Better IoT security coverage
than leading competitor

1 %

of SAM users attacked and
protected without knowing it

00:

1

seconds to identify and protect a
new device that enters the network

The difference is in the details

The difference is
in the details

Integrates with
ANY router

Already running 20+ leading router models and can be integrated with any Linux-based platform, new or legacy.

Integrates with ANY router

Already running 20+ leading
router models and can be
integrated with any Linux-based
platform, new or legacy.

Built-in
support

Includes inbuilt technical support that leads to increased customer satisfaction and reduced call center load.

Built-in support

Includes inbuilt technical
support that leads to increased
customer satisfaction and
reduced call center load.

Quickest
time-to-market

CPE-based network security with the fastest time to market because of its easy integration.

Quickest time-to-market

CPE-based network security
with the fastest time to market
because of its easy integration.

“0-to-millions in revenues
within 6 months”

Gil Rosen, Bezeq CMO

Protect your customers’
networks and their privacy
with security services that
make you stand out

Protect your customers’ networks and their privacy with security services that make you stand out

Protect your customers’
networks and their privacy
with security services that
make you stand out