Cisco Umbrella is the solution

Umbrella learns from internet activity to automatically identify attacker infrastructure staged for current and emergent threats. They capture and understand relationships between malware, domains, IPs, and networks across the internet.

As the industry’s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

JSCM Group will offer you the best prices on Cisco Umbrella. We offer the highest level of customer service and a dedicated account manager for you to work with on current projects and renewals.

Charlotte, NC Certified Cisco Reseller
Cisco Umbrella protection image

Cisco Umbrella protection image


Enterprise-wide deployment in minutes

Cisco Umbrella deployment stopwatch

Umbrella is the simplest security you’ll ever deploy. There is no hardware to install or software to manually update, and the browser-based interface provides quick setup and ongoing management.


By changing one setting on your network server, access point or router, you can protect all devices — even those you don’t manage. Implement powerful security without operational complexity.


Protect laptops when the VPN is off with Umbrella’s light weight roaming client or built-in Cisco AnyConnect integration. Easily extend protection beyond the corporate network.


The Umbrella dashboard provides both central and local administration and reporting. Effectively create and manage policies, even for complex organizations.

Cisco Umbrella foot-traffic image.jpg

Visibility into traffic both on and off your network

Your users and apps have left the perimeter. Umbrella provides visibility into internet activity across all devices, over all ports, even when users are off your corporate network. You can even retain the logs forever.


which package is right for your business?

Cisco Umbrella Professional package.png


Best for small companies

Professional package includes all of the following:

  • Block ransomware, malware, phishing, and C2 callbacks

  • Protect users anywhere they go, on and off the corporate network

  • Stop malicious domain requests and IP responses at the DNS-layer, over any port or protocol

  • Real-time, enterprise-wide activity search & scheduled reports

  • Enforce acceptable use policies using 80+ content categories

  • Create custom block/allow lists

Cisco Umbrella Insights package.png


Best for mid-sized companies

Includes everything in the Professional package plus:

  • Block direct IP connections at the IP-layer

  • Identify targeted attacks by comparing local vs. global activity

  • Identify cloud, shadow IT, & IoT usage risks by reporting on 1800+ services

  • Enforcement & visibility per internal network or AD user/group

  • Proxy risky domains for URL and file inspection using AV engines and Cisco Advanced Malware Protection (AMP)

  • Retain logs with Amazon Web Services integration using customer-managed or Cisco-managed S3 bucket

Red bar.png
Cisco Umbrella Platform package.png


Best for advanced security Teams

Includes everything in the Insights package plus:

Enforcement API

  • Deploy pre-built integrations that work with 10+ security providers – including Splunk, FireEye, and Anomali

  • Leverage custom API to easily integrate with other systems including:

    • Security appliances

    • Threat intelligence platforms or feeds

    • Custom, in-house tools

Investigate Console

  • Gain context about what Umbrella is blocking and why

  • See attacks as they form

  • Prioritize incident investigations

Orange bar.png

All packages provide:

Cisco Umbrella Easy Deployment icon


Cloud-delivered security deployed in minutes –– no hardware to install or software to maintain

Fast reliable cloud icon


Fast, reliable network that resolves 100B+ DNS requests daily for 85M+ users with no added latency

Predictive Intelligence icon


Umbrella’s live threat intelligence uncovers and blocks malicious domains, IPs, and URLs before they’re even used in attacks

blue background.jpg

See attacks before they launch

Competitive pricing available