Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Google Chrome Enterprise Reviews & Ratings
    1,873 Ratings
  • Kasm Workspaces Reviews & Ratings
    123 Ratings
  • Safetica Reviews & Ratings
    358 Ratings
  • Square POS Reviews & Ratings
    763,902 Ratings
  • OANDA Reviews & Ratings
    52,246 Ratings
  • Blockdaemon Reviews & Ratings
    2 Ratings
  • CirrusPrint Reviews & Ratings
    2 Ratings
  • Claromentis Reviews & Ratings
    87 Ratings
  • Afluencer Reviews & Ratings
    769 Ratings
  • NMIS Reviews & Ratings
    14 Ratings

What is Phantom?

The award-winning Phantom Next Generation solution empowers organizations to securely collect open-source information and conduct research via international points of presence, all while shielding both entities and individuals from potential foreign intelligence risks. Intelligent Waves has effectively integrated the GRAYPATH software-defined obfuscated network with the Phantom platform's managed attribution features, resulting in a secure, unclassified solution. This sophisticated system utilizes the comprehensive capabilities of the GRAYPATH network, substantially minimizing the chances of detection and interception of application traffic, while effectively masking the user's true location. Additionally, the Phantom platform harmonizes the user’s digital signature with the chosen point of presence, guaranteeing anonymity throughout the process. Consequently, the user's genuine IP address, geographic location, and data usage are kept concealed, making it appear as though the traffic is emanating from a remote point of presence (PoP) or interface server, thereby bolstering overall security. This pioneering strategy marks a notable leap forward in safeguarding sensitive research endeavors in a world that is becoming increasingly interconnected and complex. With such protections in place, organizations can confidently engage in research activities without the looming threat of exposure.

What is Cigloo Browser Isolation Management Platform?

The Cigloo Browser Isolation Management Platform serves as a web proxy, connecting corporate staff to a secure virtual technology environment. It offers the flexibility to be implemented either on-premises or in the cloud. With a sophisticated rule engine, Cigloo effectively isolates and manages the execution of web content. Depending on the user's privileges, their geographic location, and the specific website being accessed, Cigloo intelligently decides which browser to deploy and ensures that the execution remains anonymous. This capability enhances security while providing a seamless browsing experience for employees.

Media

Media

Integrations Supported

Facebook
Google
TikTok
X (Twitter)
YouTube

Integrations Supported

Facebook
Google
TikTok
X (Twitter)
YouTube

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Intelligent Waves

Date Founded

2006

Company Location

United States

Company Website

intelligentwaves.com/phantom/

Company Facts

Organization Name

Cigloo

Date Founded

2017

Company Location

Israel

Company Website

cigloo.io

Categories and Features

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

Kasm Workspaces Reviews & Ratings

Kasm Workspaces

Kasm Technologies
Citrix Secure Private Access Reviews & Ratings

Citrix Secure Private Access

Cloud Software Group
Authentic8 Silo Reviews & Ratings

Authentic8 Silo

Authentic8
Ericom Shield Reviews & Ratings

Ericom Shield

Ericom Software
Ericom Shield Reviews & Ratings

Ericom Shield

Ericom Software