Web Content Control Application Providing Secure & Reliable Internet Access December 2010.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Web Content Filter: technology for social safe browsing Ilya Tikhomirov Institute for Systems Analysis of the Russian Academy of Sciences
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Technical Architectures
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Web Server Hardware and Software
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing software on personal computer
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
DIR-657 HD Media Router 1000 Sales Guide Wireless & Router Product Div. Feb 2011 D-Link WRPD.
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Barracuda Load Balancer Server Availability and Scalability.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Protecting Students on the School Computer Network Enfield High School.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Barracuda NG Firewall ™
Managing Windows Security
AT&T Premises-Based Firewall Enhanced SBS Solution
Firewalls.
What’s New in Fireware v12.1.1
IS4680 Security Auditing for Compliance
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
AbbottLink™ - IP Address Overview
Firewall Installation
Product presentation.
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Web Content Control Application Providing Secure & Reliable Internet Access December 2010

Web Content Control (WCC)- Definition Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available on a particular machine or network; the motive is often to prevent persons from viewing content which the computer's owner(s) or other authorities may consider objectionable; when imposed without the consent of the user, content control can constitute censorship. Common use cases of such software include parents who wish to limit what sites their children may view from home computers, schools performing the same function with regard to computers found at school, and employers restricting what content may be viewed by employees while on the job. Source Wikipedia, the free encyclopedia

Web Content Control (WCC)- Key Drivers Web Content Control (WCC) is the ability to Identify, Control and Report the use of Internet Access from any given location within an organizations network toward any given destination on the Internet and vice versa. WCC allow organizations to make a more efficient use of the available Internet Resources (i.e. bandwidth) while avoiding access to specific Internet contents (i.e. Gaming, Dating, Sex-related content) accordingly to the nature and purpose of the organization, and avoiding improper utilization while enhancing the performance of the organization-sponsored activities such as investigation, communication and information sharing. AtomOS Web Content Control Content Control, Firewall & Security PCs at Cyber-coffees, Internet Hot Spots, etc

Web Content Control (WCC)- How does it work? AtomOS Web Content Control PCs at Cyber-coffees, Internet Hot Spots, etc Application and/or Service Identification Traffic Control Shaping, Blocking, Redirecting Reporting & Statistics Application and/or Service Identification: is the ability of the WCC Software to identify Web/Internet specific traffic over which certain actions are required; it could be an specific Internet Service such as Voice over IP, specific Internet sites via Web Browsing (http) or even specific content within any Web Page (URL Black Lists, real time web-page text search, etc.) Traffic Control: this refers to the action the WCC Software will execute on any specific traffic once identified; options includes Blocking, Shaping (bandwidth control), Redirecting (toward Captive portals or alternate sites) or simple pass-through Reporting & Statistics: this refers to the ability to keep accurate tracking of all users/traffic behavior for posterior analysis and statistical use

Web Content Control (WCC) - How does it work? Application and/or Service Identification Application and/or Service Identification Traffic Control Shaping, Blocking, Redirecting Reporting & Statistics Blocked URLs (avoided Web Sites) are dynamically updated from the Internet through well-known Black- List Services AtomOS WCC can dynamically search within text of the web pages being requested and block URL based on common patterns/keywords AtomOS WCC allows dynamic URL reporting by end users as well as de-listing requested for improper blocked ones Blocked URLs (avoided Web Sites) are dynamically updated from the Internet through well-known Black- List Services AtomOS WCC can dynamically search within text of the web pages being requested and block URL based on common patterns/keywords AtomOS WCC allows dynamic URL reporting by end users as well as de-listing requested for improper blocked ones Over 15 Million Classified URL Categorized by Profiles, Topics, etc. Over 15 Million Classified URL Categorized by Profiles, Topics, etc. Real Time Web Page Text Search Real Time Web Page Text Search

Web Content Control (WCC)- How does it work? Traffic Control Application and/or Service Identification Traffic Control Blocking, Shaping, Redirecting Reporting & Statistics Any Logical action can be taken on the Identified URL/Traffic such as Block, Shape or Redirect. Traffic Control measures can be applied on any specific time & date to each Blacklist independently Any Logical action can be taken on the Identified URL/Traffic such as Block, Shape or Redirect. Traffic Control measures can be applied on any specific time & date to each Blacklist independently Over 15 Million Classified URL Categorized by Profiles, Topics, etc. Over 15 Million Classified URL Categorized by Profiles, Topics, etc. Real Time Web Page Text Search Real Time Web Page Text Search

Web Content Control (WCC)- Enabling WCC within a Cybercafe 1/3 Internet Service Cyber Cafe Users Cyber Cafe Admin Improper Content (Sex, Violence, etc.) No Web Control Scenario

Web Content Control (WCC)- Enabling WCC within a Cybercafe 2/3 Internet Service Cyber Cafe Users Cyber Cafe Admin AtomOS WCC URL Black Lists WCC Appliance URL Blacklist Download and Configuration URL List Selection (by Topic, Time of the Day, etc.) Action Selection: Block Reporting

Web Content Control (WCC)- Enabling WCC within a Cybercafe 1/3 Internet Service Cyber Cafe Users Cyber Cafe Admin Improper Content (Sex, Violence, etc.) AtomOS WCC X X WCC Appliance Navigation/Internet Control User Protection Law Compliance More available Bandwidth Better Service

AtomAMPD Solutions for Web Content Control- What is AtomOS? AtomAMPDs Operating System (AtomOS) is a next generation, open and flexible software platform which delivers a wide set of communication services for Small-Medium-Large Enterprises as well as mid-to-large Service Providers in different areas such as IP Routing, VPN, Firewall, Radius Server/Proxy, DNS/DHCP Server/Proxy, IP Telephony among others. AtomOS can either run on application-tailored AtomAMPD networking appliances, as well as on 3 rd Party Hardware platforms such as a standard PC Server (Intel-based) AtomOS AtomOS Software AtomGUI

AtomAMPD Solutions for Web Content Control- Advantages at a glance 1/2 AtomOS provides an easy to configure (via http web access) Graphic User Interface (AtomGUI) which allows end users to quickly configure WCC services in either a centralized management fashion and/or a distributed approach. AtomOS automatically synchronizes with well-known Internet available black- list services which provides an accurate and updated source for malicious or improper Internet sites AtomOS allows an organization to proactively block/control remote-user access to specific organization content and/or simply monitor and track user behavior AtomOS Web Content Control Content Control, Firewall & Security PCs at Cyber-coffees, Internet Hot Spots, etc

AtomAMPD Solutions for Web Content Control- Advantages at a glance 1/2 AtomOS can either run on AtomAMPD network-appliances or standard PC Hardware, allowing a cost-effective introduction in such scenarios/applications that require low-cost approaches –A standard Pentium PC with moderate RAM/HD can provide fast & secure WCC service to over 200 average Internet surfers AtomOS can be leveraged in many other applications, simplifying network architecture while reducing CAPEX and OPEX: –DNS/DHCP Server/Relay –Firewall –Captive portal –Wireless Access Control & etc. AtomOS Standard PC Content Control, Firewall & Security PCs at Cyber-coffees, Internet Hot Spots, etc

AtomOS WCC Typical Network Setup- Example: Connection Center Internet Service Internet Users Cyber Cafe Admin AtomAMPD WCC PrintersCash Register Voice Over IP Web Control + Optional Modules: Internet Load Balancing Firewall (Security) IP-PBX (VoIP) Captive Portal