Web Content Filtering


Web Content FilteringEmployee Internet Access Control


Web Content Filtering

URL Control 









> Help you to enforce your web usage policies, secure your systems, meet compliance and protect your organisation’s bandwidth and productivity.

> Protection and Control Access for users whether on internet network PC, virtual desktops, mobile devices.

> Monitor individual users and filter HTTP, HTTPS, FTP, and SSL traffic.

> Safeguarded from a full spectrum of legal, regulatory, productivity, and resource utilisation risks.

> Promote work-focused Internet use

> Create a Safer Internet Environment

> URL filtering is designed to meet the Web security needs of businesses of all sizes.

> Provide the necessary protection without impeding the everyday web usage needs of employees.

> Enables IT staff to improve security.

> Business units increase productivity.

> Human resources and legal departments maintain employment laws and avoid lawsuits.

> Compliance officers and auditors demonstrate compliance with government and industry regulations.

> CIOs and IT managers reduce costs.

> Employees follow Internet acceptable-use policies and accept them as fair and reasonable.



The Challenge


Traditional appliance-based network security strategies were designed to protect users in static company facilities accessing systems running in corporate data centres. Today, users are everywhere, not just on company-issued PCs in the office, but also working from home, at Starbucks, on airplanes, in hotels, at client sites and, increasingly, on mobile devices.

Internet access is essential in virtually every business sector today.

The emergence of cloud applications - from consumer applications like YouTube and Facebook to private cloud applications and commercial cloud applications like Salesforce.com, Box.net, Office 365 and Workday - means that your company data is also everywhere - it’s no longer just in your corporate data centre.

You want to limit employee Internet access for potentially non business related web apps such as YouTube and Facebook to between 12 noon and 2 pm.




Web filtering solution features & benefits


Many security solutions often incorporate web filtering, URL filtering and anti-malware technologies. 

  • All Web Traffic (website access and Internet use) across the organisation
  • Email and Web-Based Email 
  • Instant Messenger Programs 
  • Web Chat Room Activity 
  • News Group Posts 
  • Downloads and File Transfers 
  • MS Terminal Server and Citrix MetaFrame Apps 
  • Application Access
  • 90+ website categories that can be used to tailor policies to promote acceptable Web usage.
  • Internet Watch Foundation (IWF)
  • Employee Internet Productivity
  • Create flexible time-based rules that limit access to non-work-related sites to specific times.
  • Optimise Business Bandwidth Usage
  • Web-based application control
  • Whitelisting
  • Enforce business policies for acceptable web usage
  • Enable Remote Desktop Mobility
  • Software to Monitor Employees at Work
 



Internet access control solution is an economic choice for businesses

A medium sized business employs 21 workers with a pay rate of £15 per hour.
Each employee wastes 4 hours per week over 48 weeks when incorporating holidays, sick time, and paid time off. This wasted time turns into £60,480 – a conservative estimate according to experts. In an extreme case, 16 hours are wasted per week per employee, equaling £241,920 lost in labour. Internet access control is a wise investment to accurately evaluate where improvements can be made.




Any device, anywhere protection


Protecting your company’s lifeblood - information - from accidentally or intentionally being leaked by employees.

Classify all traffic, inclusive of applications, threats and web content, then tie that traffic to users, regardless of location or device type. 




Enforce acceptable web usage policy


Inform your end users that they are trying to visit a web page that does not adhere to your corporate policy.

  • White and Black List: users have access to authorised sites only, while browsing of other sites is totally denied. 
  • Customisable block page: A page informing a user that they are violating policy can include your corporate logo, references to the username, IP address, the URL attempting to be accessed, and the category of the URL. 
  • URL filtering block and continue: Users accessing a page that potentially violates your URL filtering policy see a block page with a "Warning and Continue" button. 
  • URL filtering override: Requires a user to correctly enter a password in order to bypass the block page and continue surfing.
  • Support policy enforcement for users who belong to multiple groups




Increased productivity

  • Internet management blocks websites that may distract employees during the workday, such as social networking sites, blogs, instant messaging programs, online games, and other activities that divert attention.
     
  • Reduce staff hours dealing with network performance issues, viruses, breaches, data loss and legal related content access. 



Legal liability prevention

  • Internet access control ensures that the workplace does not become a hostile environment by tracking employee online activity. If termination becomes necessary, internet access logging provides full documentation of offensive activity to be used as evidence in support of your disciplinary action.
     
  • Reduce illegal downloads using network or organisation owned devices.



Optimise bandwidth


  • Regain bandwidth for business matters rather than leisure. Prevent media downloads, P2P, gaming, or other unrelated online content that can sap bandwidth and introduce hazardous viruses.
     
  • Implemented time-of-day bandwidth controls.



Anti-malware, ransomware, virus and spyware control


The Web has become the primary vector for delivering viruses and spyware. Users who visit sites that have been compromised can unwittingly download malware that can harm your organisation. Stop viruses at the root of origin by blocking users from harmful web pages. Most times users enter these pages unaware of the risk.




Sandbox


Determine the purpose of stealth URLs without clicking on them. Links and content are executed within a virtual environment to divulge their true nature and intention. 




Web categories


Commonly visited websites using 90+ content categories including pornography, violence, hacking, sports, news, dating, shopping, chat, and more. Content filtering policies can be customised to restrict specific websites or look for patterns in web addresses.




Pornographic image blocking


Scan and block pornographic images and videos returned by search engines. This is particularly useful in schools where you must meet legislative requirements. 



Roaming users / mobile workforce


Protect and enforce policy for your workforce whether they are on the road or simply working from home.

Data loss prevention (DLP)

  • Controlling data leaving the network over the web is critical.
     
  • Enforce granular policies to control the data loss threat from web 2.0 and social media sites. 


Webmail

  • Integrate with email solutions to scan and protect users from malicious URL content in inbound emails.
     
  • Web email can be an easy source of malicious attachments that can compromise the network’s security. Block users from accessing their personal email through gmail, yahoo mail, hotmail and etc, to ensure that no security threats are bypassed, and in turn increase employee productivity in the office. 


Cloud

Proactively block threats before they reach your users or network.

Organisations are evolving to the cloud - meaning they require a mix of on-premise and cloud security solutions. They want centralised visibility, not separate silo solutions.

Web security in the cloud protects your network and makes it easier to monitor and control internet use regardless of the user's location.



SOC support


Solutions backed by leading global security operation centres, process billions of data requests and signatures a day – serving office locations, datacentres, cloud and remote users globally.

Global data processing centres continuously update protection databases utilising customer website traffic data and cloud processing analysis. 



Global language support


Provides coverage in over 50 languages. 

 


Audit & reporting

  • Customisable admin and management dashboards
  • Individual line of business reporting dashboards.
  • Receive automated reports and analysis of network status, application usage, volumes, etc. 



Internet Watch Foundation (IWF) Partnership


Partnering with the Internet Watch Foundation (IWF) better protects users against unwanted content. To help fight against the sexual exploitation of children online URL filter incorporates the IWF’s dynamic list of URLS, which are flagged for child sexual abuse. 




Web filtering deployment platform options

  • Software for virtual or physical servers
  • Hardware Appliance
  • Cloud managed service (SaaS – software as a service)
  • Hybrid of on-premise and cloud: deploy software (virtual appliance) and SaaS managed service.







Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk