SlideShare ist ein Scribd-Unternehmen logo
1 von 18
GATEWALL
DNS FILTER
Filtering traffic by DSN requests
SECURITY ISSUES

 Over 90% of viruses infect your machine via the Internet
 The number of infected websites keeps growing
 The number of new websites grows exponentially

 The growing popularity of social network brought new types of fraud
          designed to obtain t a victim’s personal information.



It is often difficult to distinguish a phishing website from a normal site.
ENTENSYS DATABASE VS FREEWARE ANALOGS
Blocking websites that contain phishing links, Trojans, keyloggers,
botnets and malicious software



                                                               Some 100,000
                                        3,280,000                 new websites
                                                                  are added daily
                                                                  Information on
                                                                  malware
                                                                  websites comes
                                        5,035,000
                                                                  from multiple
          322,000                                                 sources

    Google Safe Browsing API      UserGate DNS Filtering DB

       Known malware websites
      Известные сайты с malware   Сайты reputation websites
                                   Poor с низкой репутацией
DYNAMIC APPROACH BENEFITS
PORN SITE CREATION EXAMPLE:
1. Create a website about butterflies
2. Classify the website as an educational page about animals (dynamics
and statics)
3. Replace content with pornography
4. With static approach, the site will be categorized as a site about animals
5. With dynamic approach, its category will be changed to Porno


      DYNAMIC APPROACH                            STATIC APPROACH
   Some 100,000 websites get modified      Category updates are rare
    every day                               As a rule, the update process is
    Information on malware websites          launched manually
    comes from multiple sources
    Database contains around 500
    million websites
    Database is kept constantly updated
EMPLOYEE EFFICIENCY

 24% of the sites that office employees visit are social network sites
 Around 55% of website requests are not related to their work
 The main goal of a social network is to make a user spends as much time
   as possible on the website



  Companies with 20 to 100 employees show the highest percentage of
                     unwarranted Internet usage.



 HOWEVER, such primitive restrictions as keyword blocking or black and
  white lists may have a negative effect on employees’ performance.
GATEWALL DNS FILTER – THE SOLUTION


    Uses SaaS model (Software-as-a-Service)
    Filters websites (500 mln URL database)
    Protects from malicious software
    Generates Internet usage reports and statistics




    Internet usage monitoring
    Increased Internet security
    Less unwanted traffic
    Better employee performance
ARCHITECTURE
HOW DOES IT WORK?

   Denial by categories (82 categories with 500 mln websites)

   Black and white lists

   White list inclusion request web-form

   Website category modification request web-form

   Advanced fail-safety

   Web statistics (reports)
BLOCKING URL CATEGORIES

        An administrator may easily configure the application to block
        sites belonging to the following categories:



 Porn sites                           Social networks
 Malware websites                     Torrents and P2P networks
 Online gambling sites                Gaming and entertainment
                                         portals
 Proxy servers and anonymizers
CUSTOMIZABLE BLACK AND WHITE LISTS



                               Some websites are blocked
White lists guarantee access
                               regardless of other network
to certain websites
                               settings
REPORTS
 Statistics by hits and categories
 Lists of blocked websites
POTENTIAL USERS
PUBLIC INSTITUTIONS                     SMALL- AND MIDSIZED
   Schools                             BUSINESSES
   Social insurance agencies              Banks
   Tax inspectorate offices               Insurance companies
   Municipal and regional                 Mining companies
    administrations                        Distribution networks
                                            Etc.



INTERNET SERVICE
PROVIDERS                               GateWall DNS Filter:
    Home networks                      A handy tool that allows Internet usage
    Second-tier ISPs                   control in companies of any size and
    Large ISPs                         companies with a spread out
    Business centers                   infrastructure
   * Individual approach to each ISP
PUBLIC INSTITUTIONS

 Schools and other                         Social insurance agencies
   educational institutions                 Retirement funds




Internet access at schools is one of the   Public Internet services
priority tasks of governments in many      Every year, many projects are
countries.                                 launched that involve different
These projects in almost all cases         technologies and require the use of the
require Internet usage at schools to be    Internet. Hence the requirement to
monitored.                                 control and secure Internet access.
SMALL- AND MIDSIZED BUSINESSES
 Proactive protection                     Employee
                                             performance




                                          Allocation of Internet traffic by
 Websites from the most dangerous
                                          categories, time and date. Websites
 categories are blocked (Spyware,
                                          that are not related to work (including
 Malware, Adult, Porno, Social
                                          social networks, online gaming portals,
 Networks, etc.). Category listings are
                                          etc.) are blocked. This helps improve
 constantly updated.
                                          employee performance.




Copyright © 2009 Entensys Corporation
INSTALLATION AND INTEGRATION

   Each project is reviewed individually

   Compatible with Microsoft NLB (Network Load Balancing)

   Flexible billing system (monthly or annual billing)

   API for integration with ISP’s billing system

   API for rules management from client account page

   Integration assistance
SIMPLE SOLUTION

    Cloud-based model

 GateWall DNS Filter does not require local installation of any hardware or
    software solutions

 The program remembers the current network mapping, security settings
    and processes executed by all existing applications

 URL database updates run in the background and do not interfere with
    the users’ work
SOME ALTERNATIVES

OpenDNS
A solution for large- and midsized companies
and schools (K-12 schools)




WebSense Hosted Web Security
One of the world’s top vendors of information security
solutions
ENTENSYS COMPANY
   Founded in 2001
   Offices in Moscow, Novosibirsk, Leipzig (Germany)
   Staff: more than 40 employees
   More details about the company and other products: http://www.entensys.com/

  STRATEGIC PARTNERS




Kaspersky Lab       Panda                BrightCloud        Commtouch
Russia              Security             USA                Israel
                    Spain

Weitere ähnliche Inhalte

Was ist angesagt?

2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
Isnur Rochmad
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
 

Was ist angesagt? (20)

Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Product Innovation Award 2009
Product Innovation Award 2009Product Innovation Award 2009
Product Innovation Award 2009
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 

Andere mochten auch

Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseenTutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Heikki Sairanen
 
Final startup for startups
Final startup for startupsFinal startup for startups
Final startup for startups
Yuri Neshitov
 
Tieto ja viestintäteknologiaan
Tieto  ja viestintäteknologiaanTieto  ja viestintäteknologiaan
Tieto ja viestintäteknologiaan
Heikki Sairanen
 
London walks 2011
London walks 2011London walks 2011
London walks 2011
Jokedm
 

Andere mochten auch (8)

Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's Risks
 
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseenTutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
 
PrePatent Auction eng
PrePatent Auction engPrePatent Auction eng
PrePatent Auction eng
 
Final startup for startups
Final startup for startupsFinal startup for startups
Final startup for startups
 
Tieto ja viestintäteknologiaan
Tieto  ja viestintäteknologiaanTieto  ja viestintäteknologiaan
Tieto ja viestintäteknologiaan
 
Tepe uusi kalvopohja
Tepe   uusi kalvopohjaTepe   uusi kalvopohja
Tepe uusi kalvopohja
 
London walks 2011
London walks 2011London walks 2011
London walks 2011
 
Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's Risks
 

Ähnlich wie GateWall DNS Filter

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
lihig
 

Ähnlich wie GateWall DNS Filter (20)

What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security  Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security
 
Incapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website SecurityIncapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website Security
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

GateWall DNS Filter

  • 2. SECURITY ISSUES  Over 90% of viruses infect your machine via the Internet  The number of infected websites keeps growing  The number of new websites grows exponentially The growing popularity of social network brought new types of fraud designed to obtain t a victim’s personal information. It is often difficult to distinguish a phishing website from a normal site.
  • 3. ENTENSYS DATABASE VS FREEWARE ANALOGS Blocking websites that contain phishing links, Trojans, keyloggers, botnets and malicious software  Some 100,000 3,280,000 new websites are added daily  Information on malware websites comes 5,035,000 from multiple 322,000 sources Google Safe Browsing API UserGate DNS Filtering DB Known malware websites Известные сайты с malware Сайты reputation websites Poor с низкой репутацией
  • 4. DYNAMIC APPROACH BENEFITS PORN SITE CREATION EXAMPLE: 1. Create a website about butterflies 2. Classify the website as an educational page about animals (dynamics and statics) 3. Replace content with pornography 4. With static approach, the site will be categorized as a site about animals 5. With dynamic approach, its category will be changed to Porno DYNAMIC APPROACH STATIC APPROACH  Some 100,000 websites get modified  Category updates are rare every day  As a rule, the update process is  Information on malware websites launched manually comes from multiple sources  Database contains around 500 million websites  Database is kept constantly updated
  • 5. EMPLOYEE EFFICIENCY  24% of the sites that office employees visit are social network sites  Around 55% of website requests are not related to their work  The main goal of a social network is to make a user spends as much time as possible on the website Companies with 20 to 100 employees show the highest percentage of unwarranted Internet usage. HOWEVER, such primitive restrictions as keyword blocking or black and white lists may have a negative effect on employees’ performance.
  • 6. GATEWALL DNS FILTER – THE SOLUTION  Uses SaaS model (Software-as-a-Service)  Filters websites (500 mln URL database)  Protects from malicious software  Generates Internet usage reports and statistics  Internet usage monitoring  Increased Internet security  Less unwanted traffic  Better employee performance
  • 8. HOW DOES IT WORK?  Denial by categories (82 categories with 500 mln websites)  Black and white lists  White list inclusion request web-form  Website category modification request web-form  Advanced fail-safety  Web statistics (reports)
  • 9. BLOCKING URL CATEGORIES An administrator may easily configure the application to block sites belonging to the following categories:  Porn sites  Social networks  Malware websites  Torrents and P2P networks  Online gambling sites  Gaming and entertainment portals  Proxy servers and anonymizers
  • 10. CUSTOMIZABLE BLACK AND WHITE LISTS Some websites are blocked White lists guarantee access regardless of other network to certain websites settings
  • 11. REPORTS  Statistics by hits and categories  Lists of blocked websites
  • 12. POTENTIAL USERS PUBLIC INSTITUTIONS SMALL- AND MIDSIZED  Schools BUSINESSES  Social insurance agencies  Banks  Tax inspectorate offices  Insurance companies  Municipal and regional  Mining companies administrations  Distribution networks  Etc. INTERNET SERVICE PROVIDERS GateWall DNS Filter:  Home networks A handy tool that allows Internet usage  Second-tier ISPs control in companies of any size and  Large ISPs companies with a spread out  Business centers infrastructure  * Individual approach to each ISP
  • 13. PUBLIC INSTITUTIONS  Schools and other  Social insurance agencies educational institutions  Retirement funds Internet access at schools is one of the Public Internet services priority tasks of governments in many Every year, many projects are countries. launched that involve different These projects in almost all cases technologies and require the use of the require Internet usage at schools to be Internet. Hence the requirement to monitored. control and secure Internet access.
  • 14. SMALL- AND MIDSIZED BUSINESSES  Proactive protection  Employee performance Allocation of Internet traffic by Websites from the most dangerous categories, time and date. Websites categories are blocked (Spyware, that are not related to work (including Malware, Adult, Porno, Social social networks, online gaming portals, Networks, etc.). Category listings are etc.) are blocked. This helps improve constantly updated. employee performance. Copyright © 2009 Entensys Corporation
  • 15. INSTALLATION AND INTEGRATION  Each project is reviewed individually  Compatible with Microsoft NLB (Network Load Balancing)  Flexible billing system (monthly or annual billing)  API for integration with ISP’s billing system  API for rules management from client account page  Integration assistance
  • 16. SIMPLE SOLUTION  Cloud-based model  GateWall DNS Filter does not require local installation of any hardware or software solutions  The program remembers the current network mapping, security settings and processes executed by all existing applications  URL database updates run in the background and do not interfere with the users’ work
  • 17. SOME ALTERNATIVES OpenDNS A solution for large- and midsized companies and schools (K-12 schools) WebSense Hosted Web Security One of the world’s top vendors of information security solutions
  • 18. ENTENSYS COMPANY  Founded in 2001  Offices in Moscow, Novosibirsk, Leipzig (Germany)  Staff: more than 40 employees  More details about the company and other products: http://www.entensys.com/ STRATEGIC PARTNERS Kaspersky Lab Panda BrightCloud Commtouch Russia Security USA Israel Spain