Published on

In today’s corporate environment employee access to Internet resources is, for many, a daily job function. Fundamentally, the web is utilized for simple day-to-day operations including virus updates, software patches and hardware drivers and other network administrator duties.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Proxy For employee monitoring
  2. 2.  In today’s corporate environment employee access to Internet resources is, for many, a daily job function. Fundamentally, the web is utilized for simple day-to-day operations including virus updates, software patches and hardware drivers and other network administrator duties. Other divisions of an organization may require the World Wide Web for resources such as market updates, company news, and general research on products or competitor’s products. In today’s business environment, access to the World Wide Web is no longer an option for many companies, but instead a requirement.  Such global World Wide Web access offered to employees raises issues and concerns over user web habits and issues with users utilizing the World Wide Web for business use during business hours. This paper will attempt to address what time and again is a problem for network and security administrators: monitoring user access to the Internet in an environment where blocking resources may not be ideal, cost effective, or in accordance with company policy.
  3. 3. Why Internet Content Filtering Software?  As an employer you have concerns about productivity, copyrights, trade secrets, improper internet usage and protection of data in connection with electronic communications. That's why it's important to always keep an eye on your employee activity. Nowadays the easiest solution is to install an internet content filtering software.  This will ensure companies the required protection, by monitoring the employees' web activity. The large amounts of time wasted surfing non-business-related websites, personal e- mail sending or chatting with friends costs the company money in lost productivity.
  4. 4.  The internet filtering program records all these and generate reports and statistics for the employers to see what happens within their organization. Other threats for the company, like download/index1.htmling large files might slow down the network and visiting unsafe/improper websites could get company in problems with law.  But web content filter monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters. Companies can restrict URL's or keyword matching websites to ensure efficient and appropriate internet browsing.
  5. 5. What are the main functionalities of this internet filter program?  Url and Content Filtering - allows management to monitor and control the network use and abuse. The web content filter can either block access to specific websites or allow specific web sites to be accessed while all other are blocked based on keywords or URL patterns and URL black lists.  Detailed Reporting and Consolidated Statistics - allows management to monitor internet traffic and breaking rules attempts
  6. 6. Profiles - allows you to block content specific web sites, such as adult, hacking and virus infected web sites. Protection against file download/index1.htmls - at management discretion (files blocking the extension: ".exe", ".bat" (applications), "mpeg." "mp3", ".wav", ".avi", ".mpg" (Audio/Video) and .ace. rar, .zip (archive).
  7. 7. Other reasons to choose Internet Content Filtering Software:  Aggregated Statistics - for longer time periods allow for strategic planning and resource allocation.  Scheduler - the capacity to calibrate a specific user list through a scheduler unrelated to active filters.  Easy Management of monitored user lists through a user friendly Web Interface.  Internet Sharing provides the possibility of Internet access to multiple computers through a single Internet connection.  The Cost Effective Solution provides strict traffic control, allows company to enforce its policy while Web Security is assured.  Designed for Windows Platform, Cyclope Internet filtering proxy supports all internet connection types including dialup, cable modem, ISDN, DSL and ADSL.
  8. 8. Proxy Inspector  High-speed internet access has become an integral part of office work. Sending and receiving e-mails, ICQ negotiations, Skype calls, Internet advertising and online marketing require spending a lot of time in the World Wide Web. But the easy access to online resources has caused outrageous abuse of computers in the workplace, which is now a serious problem for managers.
  9. 9.  Employees spend working hours on online shopping, writing non-work related messages or surfing social networks, and a considerable number of workers even do on-the-job job hunt! There have been cases, when certain employees spent eight hours a day downloading pornographic videos and pictures in the workplace. It prevented other stuff from reading business e-mails and almost paralyzed the corporate network.
  10. 10.  Such activities are now known as cyberslacking or cyberloafing, and lots of managers take measures to minimize it. Website filtering and blocking lists were rejected as ineffective and time-consuming, and the most efficient way to control corporate internet usage today is to use Internet monitoring programs. It is not a question of individual privacy, but of the abuse of company assets – according to surveys, the average employee spends about two hours each day using the Internet for personal reasons, and the wasted computer resources cost American companies more than $1 billion a year.
  11. 11.  ProxyInspector is a perfect solution for Internet usage analysis and reporting. This family of simple and efficient applications ensures effective monitoring, so your corporate network will never be a distraction for your employees, but a tool for productivity enhancement.
  12. 12. How does ProxyInspector work? The program retrieves information from log files of such popular proxy servers like Qbik WinGate, Ositis WinProxy, Kerio WinRoute Firewall, Kerio Control 7, Squid, EServ, Microsoft Threat Management Gateway 2010 or Microsoft ISA Server 2000/2004/2006 and gives a comprehensive report on Internet usage: which workstations are the most active, what websites they access, what is the general traffic distribution among sites, protocols, days of week, times of the day etc. ProxyInspector runs at a great speed even when working with large-sized log files.
  13. 13. Key features: Variety selection of reports for any task; Ability to work on any computer in your LAN; Charts; Ability to export reports to HTML, Microsoft® Excel and PDF; Printing reports directly from the built-in browser; Tools for automatic logs files import and reports creation; Sending reports via e-mail; Support for most popular proxy servers: Microsoft® Threat Management Gateway 2010, Microsoft® ISA Server 2006, 2004 and 2000, Kerio WinRoute Firewall, Kerio Control, Qbik WinGate, Ositis WinProxy and Squid.
  14. 14. Thanking you...Thanking you... For more details Click on the links given below: