Content Filtering / Traffic Shaping
One of the biggest challenges of 
			organizations today is providing Internet access that's permissive 
			enough to allow users to be productive while at the same time being 
			restrictive enough to keep users from objectionable, non-productive 
			and potentially risky Internet sites and content types. Adding to 
			the challenge is the fact that the lines have blurred between 
			legitimate sites and content types that users should be allowed 
			access to in the workplace and those that they shouldn't. 
			
			For example YouTube, once viewed as a purely recreational site, is 
			now routinely being used by more and more companies as a way to 
			disseminate valuable product information, updates, training and so 
			forth. In short, evolving job functions and departmental 
			requirements have antiquated the "one-size-fits-all" content 
			filtering policy approach of the past and rendered it incapable of 
			meeting modern day organizational requirements. 
			
			To meet the challenges of 21st century business resource and 
			information requirements while still maintaining an effective and 
			secure Internet Content Filtering policy requires a much more 
			individualized approach, one that is specific to a users’ profile, 
			permissible enough to allow them to perform their job function 
			unimpeded while at the same time sufficiently restrictive so as to 
			disallow unproductive or otherwise unsafe activities.
			
			Fortress IT can help you leverage technology to create specific 
			content filtering policies for each of your different user and 
			departmental requirements and have these automatically applied based 
			on network login credentials and Active Directory group membership.
			
			In addition we can augment these with specific traffic shaping 
			policies that allow access to bandwidth-greedy media types such as 
			streaming video, audio and other rich Web 2.0 media while applying 
			bandwidth constraints to them, thereby assuring that the overall 
			health and performance of the network doesn't suffer due to 
			excessive bandwidth consumption and guaranteeing that core services 
			(e.g. email, VPN, B2B connectivity, etc) continue to operate 
			optimally.
			
