22
網網網網網網網網網網網 網網網網網網網網網網網 網網網 網網網網網網網網網網 網網網網網 [email protected] www.c-globe.com

網路不當資訊防堵面面觀

  • Upload
    ginata

  • View
    47

  • Download
    6

Embed Size (px)

DESCRIPTION

網路不當資訊防堵面面觀. 駱易非 九寰科技股份有限公司 研發部副總 [email protected] www.c-globe.com. Agenda. 網際網路上的不當資訊 不當資訊防堵解決方案簡介 Pass-Through 與 Pass-By 防堵技術之比較 成熟的不當資訊防堵系統之必備條件 相關產品比較 實機展示 Q & A. What percentage of internet porn is downloaded from 9 to 5?. Source SexTracker. 70%. - PowerPoint PPT Presentation

Citation preview

Page 1: 網路不當資訊防堵面面觀

網路不當資訊防堵面面觀 網路不當資訊防堵面面觀

駱易非九寰科技股份有限公司

研發部副總[email protected]

www.c-globe.com

Page 2: 網路不當資訊防堵面面觀

AgendaAgenda

網際網路上的不當資訊網際網路上的不當資訊

不當資訊防堵解決方案簡介不當資訊防堵解決方案簡介

Pass-ThroughPass-Through 與與 Pass-ByPass-By 防堵技術之比較防堵技術之比較

成熟的不當資訊防堵系統之必備條件成熟的不當資訊防堵系統之必備條件

相關產品比較相關產品比較

實機展示實機展示

Q & AQ & A

Page 3: 網路不當資訊防堵面面觀
Page 4: 網路不當資訊防堵面面觀

Source SexTracker

What percentage of

internet porn

is downloaded

from 9 to 5?

Page 5: 網路不當資訊防堵面面觀

70%

Page 6: 網路不當資訊防堵面面觀

IDC Research

What percentage of

workplace

Internet surfing

is not business related?

Page 7: 網路不當資訊防堵面面觀

40%

Page 8: 網路不當資訊防堵面面觀

WordTracker.com

What are the top 3 word searches on the

internet?MP3

Hotmail

Sex

Page 9: 網路不當資訊防堵面面觀
Page 10: 網路不當資訊防堵面面觀

Key Features

Comprehensive MRMAnalyzes, Reports and Manages

Internet Access

Master Database DrivenBetter categorizationNo keyword “overblocking”Automatic daily updates

Server-basedMulti-platform supportNo client-side maintenanceP

LA

TF

OR

MS

SY

ST

EM

CO

RE

AP

PL

ICA

TIO

N

MO

DU

LE

S

Page 11: 網路不當資訊防堵面面觀

How Does it Work?

Permitted Request

Blocked Request

ActivityMonitor

Reports & Analysis

Updated Daily

User

Monitor usage Graphical reports Customizable

management

Written Policy +Rules Set-upIn Websense

WebsenseEnterprise

INTERNET

INTERNET

DATABASE

Firewall, Cache Appliance or Proxy Server

Page 12: 網路不當資訊防堵面面觀

Pass-Through Technology

Page 13: 網路不當資訊防堵面面觀

Pass-Through Technology(續 )

Page 14: 網路不當資訊防堵面面觀

Pass-By Technology

Page 15: 網路不當資訊防堵面面觀

Pass-By Technology(續 )

Page 16: 網路不當資訊防堵面面觀

Pass-Through vs. Pass-By

Reliability

Scalability

Page 17: 網路不當資訊防堵面面觀

成熟的不當資訊防堵系統之必備條件Over-Block vs. Under-Block

Database CoverageDatabase Accuracy

Flexible Policy ManagementPermit/BlockQuotaTime of dayPassword overrideDeferUsername/Group

Powerful ReportsCentralized Filtering Policy ManagementIntegration with Most Firewall/Proxy/Cache

Page 18: 網路不當資訊防堵面面觀

相關產品比較

Page 19: 網路不當資訊防堵面面觀
Page 20: 網路不當資訊防堵面面觀

實機展示H/W Configuration

CPU: Pentium III 700RAM: 512 MBHD: 20 GB

S/W ConfigurationMicrosoft Windows 2000 Server SP2Microsoft ISA Server 2000 Enterprise EditionWebsense Enterprise 4.4Websense Reporter 6.3

Page 21: 網路不當資訊防堵面面觀

Q & AQ & A

駱易非九寰科技股份有限公司

研發部副總[email protected]

(02) 2655-2999

www.c-globe.com

Page 22: 網路不當資訊防堵面面觀

The Top Ranked Product in EIM: Websense (www.websense.com)

The Top Ranked Product in EIM: Websense (www.websense.com)

“ When you’re ready to buy, we recommend

Websense…”— ZDNet

“Websense offers the right combination of a rich feature set and easy

administration.”— Internet Computing

“Websense is a blocking and filtering powerhouse.”

— PC Magazine

“ When you’re ready to buy, we recommend

Websense…”— ZDNet

“Websense offers the right combination of a rich feature set and easy

administration.”— Internet Computing

“Websense is a blocking and filtering powerhouse.”

— PC Magazine

SIFTSIFTFounding

Member of Secure Internet Filtering

Technology Consortia