FIREWALL & CONTENT FILTERING

Keep your business data secure and protected. Network security is not just about protection from hackers and viruses - it's also about protecting your business from losing time and money to extensive downtime. Small business owners are especially challenged to balance open employee access with the need to protect their networks from harm.
ITS can help you strike the right balance with:
Security Analysis - a complete risk profile created by our security experts
Security Appliances - integrated solutions that provide complete protection
Security Policies - designed to protect the integrity and confidentiality of your data
Security Point Solutions - to safeguard your systems from intrusion, viruses, and spam
Content filtering is a security method of restricting access to or blocking internet material that may be inappropriate for viewing by a specific community or harmful to systems. In an enterprise, the community may be considered all employees or be broken down into groups (i.e. executives, security professionals and everyone else). The inappropriate material may include pornography, chat, gambling, web mail, etc.
Aside from just being a “net nanny”1 for employees, content filtering can also provide another layer of protection for systems. For example, the content filtering system could do antivirus scanning. It could also scan and block Java and ActiveX which attempts to perform malicious, or otherwise questionable, operations. Restrictions to certain file types may also be applied. This could keep clients from downloading harmful code in executables or other potentially dangerous file types.
Scanning HTTPS is yet another function of content filtering. The ability to scan and block HTTPS is extremely desirable today. This encrypted traffic has the potential of delivering harmful code to the client without being detected by firewalls or IDS (Intrusion Detection Systems). A content filtering system would mitigate much of this risk. Considering key components crucial to your recovery, and establish a formal process to be followed to restore your business continuity when a disaster occurs.

Comments are closed.