Content Filtering: Taming The Wild Web

1y ago
4 Views
1 Downloads
712.04 KB
9 Pages
Last View : 2m ago
Last Download : 3m ago
Upload by : Kaleb Stephen
Transcription

Content Filtering:Taming the Wild Web

Content Filtering:Taming the Wild WebThe Internet has provided businesses with an arrayContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacyof benefits and endless opportunities, but it also givesemployees the chance to surf on websites unrelated tobusiness during working hours. This expert E-Guide, broughtto you by SearchSecurity.com, highlights how to create abalance between web content filtering and employeeprivacy.Content filtering – Taming the wild WebBy Lisa PhiferThe World Wide Web has been a boon to business and a bane to thosetasked with managing Internet use. According to IDC, 40% of workplaceInternet activity is unrelated to business. Nearly four out of five FBI-surveyedcompanies report that employees abuse Internet privileges by downloadingpornography or pirated software. Worse, even business-related Web surfinghas grown dangerous. For example, losses from phishing attacks aloneexceeded 2.8 billion last year. Delivering safe, fast, transparent Web accessthat meets workforce needs has never been more challenging.Business case for content filteringGartner recently identified five steps to "dramatically reduce the risk ofvaluable information ending up in the wrong hands or forcing anembarrassing public disclosure." Topping that list: content monitoring andfiltering for common Internet vectors, including email, IM, FTP and HTTP.Email security covers part of this territory; content filtering can tackle the rest.Web content filters permit or deny outbound HTTP and related requests inaccordance with your Internet Acceptable Use Policy (AUP). This can reducethe bandwidth and productivity drain of non-business activities such aspersonal Web mail, music downloads, online gambling and porn surfing.Documenting countermeasures can limit liability for employee misdeeds orhelp you comply with industry-specific regulations. For example, theChildren's Internet Protection Act requires that schools and libraries preventPage 2 of 9Sponsored by

Content Filtering:Taming the Wild Webonline access to sites that are obscene, contain child pornography, or areharmful to minors. Phishing, pharming, drive-by spyware and other WebContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacyexploits also offer ample motivation for inspecting responses, preventingHTTP-borne threats from entering your network.Adding content filtering to your networkContent filters can be deployed on firewalls, Web caches, or dedicatedservers/appliances. Although each has its benefits, appliances are designedto offload the burden of URL filtering, detailed HTTP inspection, and Webusage logging -- resource-intensive tasks that could turn a heavily usedcache or firewall into a bottleneck. In short, content-filtering appliancescomplement those systems, adding the muscle and features necessary toefficiently enforce your AUP.Content-filtering appliances may operate in line and/or out of band. Forexample, the 8e6 R3000 supports three modes: invisible, router or firewall. Ininvisible mode, switch port replication copies Web requests to the appliance,which returns a "blocked page" response for denied requests. In routermode, the appliance sits in line, filtering outbound Web requests but notinbound responses. Firewall mode filters both outbound and inbound Webpackets. In all cases, outbound Web traffic must be sent through theappliance, by the network or browser. But relying on browser settings (evenautomated configuration via PAC files) won't cover visitors or unsupporteddevices/browsers.Content-filtering appliances should be placed inside your perimeter firewall.The firewall provides TCP/IP screening, while the appliance enforces Webcontent-specific policies. In larger distributed networks, appliances can bedeployed for each site/subnet or in load-balanced clusters. Content filteringadds latency to a transactional application with high user expectations, soperformance and transparency are important.Finding a content-filtering applianceContent-filtering features are widely available for firewalls (e.g., CheckPoint,Cisco, eSoft, Fortinet, Juniper, SonicWALL) and Web caches (e.g., BlueCoat, Network Appliance, Network Engines, Stratacache). Such packagesPage 3 of 9Sponsored by

Content Filtering:Taming the Wild Webleverage a platform that already inspects Web traffic but spreads existingresources across multiple tasks.ContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacyThose who prefer to dedicate a system to content filtering can install similarsoftware on an off-the-shelf server, using such products as WebSense WebSecurity, Secure Computing SmartFilter, SurfControl Web Filter andSymantec Web Security. This focuses resources on content filtering andrequires expertise and elbow grease to harden the platform and optimizeperformance.Content-filtering appliances combine the TCO advantages of turnkey securityhardware with the laser-like focus of a dedicated filtering server. A fewexamples are: Barracuda Web Filter Appliance Bloxx CF-Series Celestix MSA Appliance Crossbeam Systems Secure Content URL Filtering 8e6 R3000 Enterprise Internet Filter Network Engines NS9000 Resilience NetSquad Secure Computing WebWasher Appliances SonicWALL Content Security Manager St. Bernard iPrismSome are general-purpose appliances that can be deployed as dedicatedcontent-filtering servers. For example, Crossbeam blade servers can runSecure Computing or Websense content-filtering software. Others arepurpose-built appliances developed exclusively to provide "Internet filtering."Which is the better fit for your company? That depends on your filteringfeature needs, performance requirements and security architecture.Choosing the right applianceLike other security systems, content-filtering appliances must be hardenedagainst attack and unauthorized admin access. Effective content filteringrequires speed and storage for a large number of transactions, so considerPage 4 of 9Sponsored by

Content Filtering:Taming the Wild Webworkforce size and average/peak request rate when selecting appliancemodels and deciding how many to deploy.ContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacyBeyond these fundamentals, look for an appliance that can implement yourdefined AUP and auditing requirements. Every content-filtering appliance canblock outbound HTTP, but not all filter responses that might carry bannedcontent. Similarly, most can deny HTTPS to forbidden domains, but some donot inspect SSL-encrypted payload. In fact, "Internet filtering" appliancesoften examine other traffic, from conventional protocols like FTP and NNTPto newer channels like IM and P2P. This diversity complicates comparison,so start by deciding how you want to distribute enforcement between yourfirewall and content-filtering appliance, then find products that can implementthat split.Next, consider how Web requests are filtered. Blacklists may be composedof configured IP addresses, domain names and URL patterns -- or they maycontain dynamic quarantine entries that reflect recent experience. Manyappliances also offer categorized URL databases. Evaluate coverage incategories that interest you, database update frequency, and the granularityof whitelist exceptions.If you want the appliance to filter responses, what do you expect theappliance to look for? Possibilities may include blocking or cleansingresponses that contain banned words, image files, risky MIME types,unsigned active code, or malware. Some appliances can force Google orYahoo Safe Search mode "on" to eliminate explicit sexual content fromsearch results, but this is more of a complement than replacement for policybased filtering at the edge of your own network.If your AUP establishes different rules for individuals or workgroups,appliance policies must reflect that granularity. User/group profiles mayspecify categories, whitelists, time of day, bandwidth, or supported useragents. To avoid extra authentication when users access the Web, look foran appliance that supports single sign-on and your existing authenticationsystem (e.g., NTLM, AD, LDAP, eDirectory). Also consider whetherorganizations must have the ability to specify their own policies.Page 5 of 9Sponsored by

Content Filtering:Taming the Wild WebFinally, look carefully at reporting tools provided by the appliance to analyzeand track Internet use throughout your network. Some companies start usingContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacycontent filters simply to spot and document inappropriate Web activity. This isan excellent way to learn what your network is really being used for whendefining an Internet AUP. Unless your workforce is small, however,automated analysis and summary reports with drill-down capability will bekey to isolating Web abuse and risk exposure.About the Author:Lisa Phifer is vice president of Core Competence Inc., a consulting firmspecializing in network security and management technology. Phifer hasbeen involved in the design, implementation and evaluation of datacommunications, internetworking, security and network managementproducts for nearly 20 years. She teaches about wireless LANs and virtualprivate networking at industry conferences and has written extensively aboutnetwork infrastructure and security technologies for numerous publications.She is also a site expert to SearchMobileComputing.com andSearchNetworking.com.Balancing Web filtering and employee privacyBy Jim Rendon, SearchNetworking.com News WriterVendors in this market often say their products help to clear up bandwidth. Isthis really an effective way to do that?Corporate bandwidth is expensive, and companies are always looking atways to improve the efficiency of bandwidth. Web-filtering can be an effectiveway of dealing with problems exacerbated by inappropriate transferring oflarge image and sound files. Most companies don't allow employees todownload music, for example, but they have no way to enforce that policy.With Web-filtering software, they can now enforce their policies on Internetuse. What is driving this growth?There are three drivers: increasing productivity, preserving corporatebandwidth and helping companies to avoid lawsuits. If employees havePage 6 of 9Sponsored by

Content Filtering:Taming the Wild Webunfettered access to the Internet, they may access a Web site that will offenda colleague. Increasingly, companies feel they need to be protected againstContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacythat. Employees have sued companies for exposing them to pornography orracist information. If companies can block certain URLs, they can allowlegitimate business use of the Internet without fear of lawsuits. Are ITorganizations the best ones to monitor Internet use?These systems are being integrated into gateways and firewalls, and theytarget corporate bandwidth so, in that sense, IT departments should beinvolved. But business managers and human resources departments are theones concerned with increasing productivity. Often, when it comes topurchasing these products, business managers have more say than ITmanagers. So implementing these products takes collaboration with otherdepartments. Often, different departments will have their own requirementsfor how they do and do not want their employees using the Internet, requiringdiffering levels of freedom to be granted throughout the organization. Therewill also be collaboration across different business units. What aboutincreasing productivity? Does Web filtering really help with that?There is no guarantee that if employees are not surfing the Web that they areworking. They may take a break or talk to their colleagues instead. Do yousee any employee backlash to filtering and monitoring?There has to be a balance. Employees spend much of their time at work.Some people may need to purchase a gift online or book holiday traveltickets. It is important from the employee's point of view to allow somefreedom. Some sites will always be inappropriate, like gambling orpornography, but others, like online retailers or travel agencies, might beappropriate. Allowing broader access after hours or during lunch might be agood approach. [By using Web-filtering software], you are taking awayfreedom from the employees, which you can't do all at once. It is important tonot be seen as militaristic. Over the next few years, will unlimited Internetaccess at work become a distant memory?This is one of the fastest growing markets, not only within IT security, butalso within the entire IT market. Most Fortune 1000 companies are at least inPage 7 of 9Sponsored by

Content Filtering:Taming the Wild Webthe testing stage with Web-filtering products, but it may not be for everyone.Some companies feel that they have more immediate security concerns.ContentsContent filtering –Taming the wild WebBalancing Webfiltering and employeeprivacyPage 8 of 9Some managers think their employees are responsible enough to managetheir own time. There are also still problems with sites being blocked thatshouldn't. And the software itself has been known to create congestion onthe network as it moves through its workload. All of this may put somecompanies off, but many have shown strong interest.Sponsored by

Content Filtering:Taming the Wild WebContentsFree resources for technology professionalsTechTarget publishes targeted technology media that address your need forContent filtering –Taming the wild Webinformation and resources for researching products, developing strategy andBalancing Webfiltering and employeeprivacyWeb sites gives you access to industry experts, independent content andmaking cost-effective purchase decisions. Our network of technology-specificanalysis and the Web’s largest library of vendor-provided white papers,webcasts, podcasts, videos, virtual trade shows, research reports and more—drawing on the rich R&D resources of technology providers to addressmarket trends, challenges and solutions. Our live events and virtual seminarsgive you access to vendor neutral, expert commentary and advice on theissues and challenges you face daily. Our social community IT KnowledgeExchange allows you to share real world information in real time with peersand experts.What makes TechTarget unique?TechTarget is squarely focused on the enterprise IT space. Our team ofeditors and network of industry experts provide the richest, most relevantcontent to IT professionals and management. We leverage the immediacy ofthe Web, the networking and face-to-face opportunities of events and virtualevents, and the ability to interact with peers—all to create compelling andactionable information for enterprise IT professionals across all industriesand markets.Related TechTarget WebsitesPage 9 of 9Sponsored by

Content-filtering appliances combine the TCO advantages of turnkey security hardware with the laser-like focus of a dedicated filtering server. A few examples are: Barracuda Web Filter Appliance Bloxx CF-Series Celestix MSA Appliance Crossbeam Systems Secure Content URL Filtering 8e6 R3000 Enterprise Internet Filter

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

SonicWALL Content Filtering feature. A Web browser is used to access the SonicWALL Management interface, and the commands and functions of Content Filtering. The following sections are in this chapter: Accessing the SonicWALL using a Web browser Enabling Content Filtering and Blocking Customizing Content Filtering

Vol I, Bharat Law House, Delhi, 27th Edn. 2013. Ratanlal & Dhirajlal’s Law of Crimes – A Commentary on The Indian Penal Code, Vol II, Bharat Law House, Delhi, 27 th Edn. 2013.