Phone: 214.227.8499
Email:
contact@fortress-it.net

Content Filtering / Traffic Shaping

One of the biggest challenges of organizations today is providing Internet access that's permissive enough to allow users to be productive while at the same time being restrictive enough to keep users from objectionable, non-productive and potentially risky Internet sites and content types. Adding to the challenge is the fact that the lines have blurred between legitimate sites and content types that users should be allowed access to in the workplace and those that they shouldn't.

For example YouTube, once viewed as a purely recreational site, is now routinely being used by more and more companies as a way to disseminate valuable product information, updates, training and so forth. In short, evolving job functions and departmental requirements have antiquated the "one-size-fits-all" content filtering policy approach of the past and rendered it incapable of meeting modern day organizational requirements.

To meet the challenges of 21st century business resource and information requirements while still maintaining an effective and secure Internet Content Filtering policy requires a much more individualized approach, one that is specific to a users’ profile, permissible enough to allow them to perform their job function unimpeded while at the same time sufficiently restrictive so as to disallow unproductive or otherwise unsafe activities.

Fortress IT can help you leverage technology to create specific content filtering policies for each of your different user and departmental requirements and have these automatically applied based on network login credentials and Active Directory group membership.

In addition we can augment these with specific traffic shaping policies that allow access to bandwidth-greedy media types such as streaming video, audio and other rich Web 2.0 media while applying bandwidth constraints to them, thereby assuring that the overall health and performance of the network doesn't suffer due to excessive bandwidth consumption and guaranteeing that core services (e.g. email, VPN, B2B connectivity, etc) continue to operate optimally.