02:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Bloxx Web Filter And Secure Web Gateway Now Available In North America

Dynamic filter analyzes Web content in real time

Boston, Mass., (October 04, 2012) -- Bloxx, a leader in Web content filtering and email security, today announced a significant upgrade to its Bloxx Web Filter for North American markets. The Bloxx Web Filter with Bloxx Tru-View Technology is a next-generation dynamic filter that analyzes web content in real time compared with conventional filters that rely on static and fixed lists of known URLs.

New features of this release include faster performance with a new UBUNTU-powered platform; improved reporting tools including a real-time system and activity dashboard; and an SSL decryption engine to filter SSL traffic and provide protection against HTTPS content and malware.

The company also announced the North American availability of its Bloxx Secure Web Gateway for large enterprises. The gateway combines Bloxx's dynamic real-time content analysis and classification engine, Tru-View Technology, with the company's SSL proxy and a powerful Sophos anti-malware with Genotype threat-engine technology.

"Research from Google* tells us that several billion new web pages come online every day, making it impossible for URL-search-only filters to protect companies and schools from inappropriate or malicious content," said Eamonn Doyle, president of Bloxx. "Tru-View Technology analyzes web content in real time, and blocks or grants access according to policy-based categories. It can even block proxy sites used to get around second- generation URL-based filter tools."

Additional enhancements to the Bloxx Web Filter include:

- Radius Server authentication to maintain policy protections for wireless users

- YouTube Safe Search and YouTube for Schools integration support

- PostgreSQL for real-time updating of reports

- Remote filtering for iOS devices

- Improved scalability for larger deployments - new clustering capability which is scalable up to dozens of nodes

- Improved controls to allow more flexibility regarding blocking policies


The new versions of the Bloxx Web Filter and Bloxx Secure Web Gateway are now available in a range of different configurations, from the 100W which supports up to 100 network devices, to the Impresa-7W which supports up to 10,000 network devices. The price for the Bloxx 100W Web Filter for three years, including the appliance, software, next-day hardware replacement, installation and unlimited technical support is $6,395. The Bloxx 1750S Secure Web Gateway with Sophos anti-malware, including the appliance, software, next-day hardware replacement, installation and unlimited technical support is $64,463.


Headquartered in Boston, Mass., with an international presence in the UK, Holland and Australia, Bloxx Inc. offers appliance-based Web and email filtering and security for medium and large organizations in both the business and public sectors. Bloxx has achieved significant sales growth year-on-year to become a leading Web filtering provider with an estimated 5 million+ users worldwide. For more information, visit

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web