NetSpective aggressively delivers and pro-actively updates defences against sites that users commonly leverage to circumvent filtering policies.
How Anonymous Proxies Are Blocked
Due to questionable sites like Anonymous Proxies and Hacking sites changing on a day to day basis, we utilize a feature referred to as our Micro Updates. Unknown websites that are detected by the NetSpective appliance are sent back to TeleMate.Net for evaluation. TeleMate.Net’s categorization enginewill then categorize the URL and send it out to all NetSpective Appliances every 10 minutes. Every NetSpective has the benefit of learning from every other NetSpective in our entire customer base.
NetSpective can granularly block access to bandwidth-intensive and potentially harmful P2P sites, content and applications while allowing access to those that are organization-approved.
How P2P Applications Are Blocked
Peer-to-Peer applications that allow users to pirate files or bypass the filter are fully blocked with the NetSpective Content Filter. Each of these applications are evaluated on a quarterly basis and the signatures are updated based on any changes that are seen within the protocols used by the application. This ensures that all of our customers will have the latest protocol detection signatures and can fully block each of these applications on their network.
NetSpective provides features to automate functions for busy technology staff. Network Abuse Detection allows administrators to receive alerts on users trying to access forbidden websites, as well as shut down all internet access automatically.
How Network Abuse Detection Works
Administrators can be sent email alerts when users surf traffic that exceeds thresholds on sensitive categories. System Admins also have the option to lock down all web traffic and protocol activity based on those traffic thresholds. This is typically used as a teaching mechanism for K12 customers where students can then be disciplined and taught proper surfing behaviour.
NetAuditor includes trend-based monitoring and notification to provide real-time awareness of traffic patterns. Where the dashboard allows you to perform "Top N" searches of your processed data, the monitors allow you to tell the NetAuditor processing engine to watch for something specific as data is processed in real-time.
How Real-Time Trend-based Alerts Work
You can check the monitor component at any time and instantly see all monitored traffic for the past 24 hours (down to 1-minute increments). You can set up alerts or event triggers to have the processing engine alert you immediately if the monitored traffic exceeds certain thresholds.