Content Filtering / Traffic Shaping
One of the biggest challenges of
organizations today is providing Internet access that's permissive
enough to allow users to be productive while at the same time being
restrictive enough to keep users from objectionable, non-productive
and potentially risky Internet sites and content types. Adding to
the challenge is the fact that the lines have blurred between
legitimate sites and content types that users should be allowed
access to in the workplace and those that they shouldn't.
For example YouTube, once viewed as a purely recreational site, is
now routinely being used by more and more companies as a way to
disseminate valuable product information, updates, training and so
forth. In short, evolving job functions and departmental
requirements have antiquated the "one-size-fits-all" content
filtering policy approach of the past and rendered it incapable of
meeting modern day organizational requirements.
To meet the challenges of 21st century business resource and
information requirements while still maintaining an effective and
secure Internet Content Filtering policy requires a much more
individualized approach, one that is specific to a users’ profile,
permissible enough to allow them to perform their job function
unimpeded while at the same time sufficiently restrictive so as to
disallow unproductive or otherwise unsafe activities.
Fortress IT can help you leverage technology to create specific
content filtering policies for each of your different user and
departmental requirements and have these automatically applied based
on network login credentials and Active Directory group membership.
In addition we can augment these with specific traffic shaping
policies that allow access to bandwidth-greedy media types such as
streaming video, audio and other rich Web 2.0 media while applying
bandwidth constraints to them, thereby assuring that the overall
health and performance of the network doesn't suffer due to
excessive bandwidth consumption and guaranteeing that core services
(e.g. email, VPN, B2B connectivity, etc) continue to operate
optimally.
