zvelo’s meticulously curated datasets for Malicious URLs, Phishing URLs, and Web Content Categorizations, support new tiered service offering and drive revenue growth for a global Remote Browser Isolation provider.Details
ISPs, Telcos, device manufacturers, and security vendors go to great lengths to provide their customers’ with online security from malicious and objectionable content (adult, pornography, hate speech, terrorism, cryptocurrency mining, etc.). The industry’s best web filtering (and dns filtering) and parental controls are powered by a global network of over 600 million end users providing unmatched coverage and accuracy of active web traffic and websites. zvelo provides 99.9% coverage and over 99% accuracy for the ActiveWeb. That’s best-in-class URL classification database for OEMs and device manufacturers.
Mobile security platform leverages zvelo’s full-path URL classification to identify malicious and suspicious URLs appearing within whitelisted sites.Details
This post demonstrates the lifecycle of a website and how it moves through zvelo’s InActiveWeb, ProActiveWeb and ActiveWeb.
zveloDB supports a safe and secure distance learning environment for a leading G Suite classroom management solution partnered with schools worldwide.Details
While both can be harmful, dangerous, or threaten the safety of online users, there are very clear distinctions between Malicious vs Objectionable content. Understand how zvelo differentiates between them.
Compliance risk assessment platform for video communication and collaboration tools secured against objectionable content with zveloCAT full-path categorization.Details
OEMs receive notification that the RuleSpace URL database is going end of life (EoL) leaving security partners scrambling to find a RuleSpace alternative.Details
zvelo is proud to sponsor The Packet Hub’s program offering free parental controls service to families affected by the COVID-19 stay-at-home policies.
Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks?
Implementing critical security policies is one thing, but enforcing them is an uphill battle. Here are 5 security battles worth fighting to enforce.