In today’s corporate environment employee access to Internet resources is, for many, a daily job function. Fundamentally, the web is utilized for simple day-to-day operations including virus updates, software patches and hardware drivers and other network administrator duties.
2.
In today’s corporate environment employee access to Internet
resources is, for many, a daily job function. Fundamentally, the
web is utilized for simple day-to-day operations including virus
updates, software patches and hardware drivers and other
network administrator duties. Other divisions of an
organization may require the World Wide Web for resources
such as market updates, company news, and general research
on products or competitor’s products. In today’s business
environment, access to the World Wide Web is no longer an
option for many companies, but instead a requirement.
Such global World Wide Web access offered to employees
raises issues and concerns over user web habits and issues
with users utilizing the World Wide Web for business use
during business hours. This paper will attempt to address what
time and again is a problem for network and security
administrators: monitoring user access to the Internet in an
environment where blocking resources may not be ideal, cost
effective, or in accordance with company policy.
3. Why Internet Content Filtering
Software?
As an employer you have concerns about productivity,
copyrights, trade secrets, improper internet usage and
protection of data in connection with electronic communications.
That's why it's important to always keep an eye on your
employee activity. Nowadays the easiest solution is to install an
internet content filtering software.
This will ensure companies the required protection, by
monitoring the employees' web activity. The large amounts of
time wasted surfing non-business-related websites, personal e-
mail sending or chatting with friends costs the company money
in lost productivity.
4.
The internet filtering program records all these and generate
reports and statistics for the employers to see what happens
within their organization. Other threats for the company, like
download/index1.htmling large files might slow down the
network and visiting unsafe/improper websites could get
company in problems with law.
But web content filter monitors the entire Internet traffic and
blocks the access to websites and files according to the chosen
filter. The requested web pages are displayed only if they
comply with the specified filters. Companies can restrict URL's
or keyword matching websites to ensure efficient and
appropriate internet browsing.
5. What are the main functionalities of
this internet filter program?
Url and Content Filtering - allows
management to monitor and control the
network use and abuse. The web content
filter can either block access to specific
websites or allow specific web sites to be
accessed while all other are blocked based
on keywords or URL patterns and URL
black lists.
Detailed Reporting and Consolidated
Statistics - allows management to monitor
internet traffic and breaking rules attempts
6. Profiles - allows you to block content specific
web sites, such as adult, hacking and virus
infected web sites.
Protection against file download/index1.htmls
- at management discretion (files blocking
the extension: ".exe", ".bat" (applications),
"mpeg." "mp3", ".wav", ".avi", ".mpg"
(Audio/Video) and .ace. rar, .zip (archive).
7. Other reasons to choose Internet
Content Filtering Software:
Aggregated Statistics - for longer time
periods allow for strategic planning and
resource allocation.
Scheduler - the capacity to calibrate a
specific user list through a scheduler
unrelated to active filters.
Easy Management of monitored user lists
through a user friendly Web Interface.
Internet Sharing provides the possibility of
Internet access to multiple computers
through a single Internet connection.
8. Proxy Inspector
High-speed internet access has become
an integral part of office work. Sending and
receiving e-mails, ICQ negotiations, Skype
calls, Internet advertising and online
marketing require spending a lot of time in
the World Wide Web. But the easy access
to online resources has caused outrageous
abuse of computers in the workplace, which
is now a serious problem for managers.
9.
Employees spend working hours on online
shopping, writing non-work related
messages or surfing social networks, and a
considerable number of workers even do
on-the-job job hunt! There have been
cases, when certain employees spent eight
hours a day downloading pornographic
videos and pictures in the workplace. It
prevented other stuff from reading business
e-mails and almost paralyzed the corporate
network.
10.
Such activities are now known as
cyberslacking or cyberloafing, and lots of
managers take measures to minimize it.
Website filtering and blocking lists were
rejected as ineffective and time-consuming,
and the most efficient way to control
corporate internet usage today is to use
Internet monitoring programs. It is not a
question of individual privacy, but of the
abuse of company assets – according to
surveys, the average employee spends
about two hours each day using the Internet
11.
ProxyInspector is a perfect solution for
Internet usage analysis and reporting. This
family of simple and efficient applications
ensures effective monitoring, so your
corporate network will never be a
distraction for your employees, but a tool for
productivity enhancement.
12. How does ProxyInspector work?
The program retrieves information from log
files of such popular proxy servers like Qbik
WinGate, Ositis WinProxy, Kerio WinRoute
Firewall, Kerio Control 7, Squid, EServ,
Microsoft Threat Management Gateway
2010 or Microsoft ISA Server
2000/2004/2006 and gives a
comprehensive report on Internet usage:
which workstations are the most active,
what websites they access, what is the
general traffic distribution among sites,
protocols, days of week, times of the day
13.
14. Key features:
Variety selection of reports for any task;
Ability to work on any computer in your LAN;
Charts;
Ability to export reports to HTML, Microsoft®
Excel and PDF;
Printing reports directly from the built-in
browser;
Tools for automatic logs files import and
reports creation;
Sending reports via e-mail;