SlideShare a Scribd company logo
1 of 10
Download to read offline
Allot Communications Solutions

Allot and Optenet
Parental Control
Solution Brief

vbvbv

© Allot Communications. All rights reserved. May 2012
Solution Brief:
Allot and Optenet Parental Control

Table of Contents
Introduction ............................................................................................................................................... 3
Motivation.................................................................................................................................................. 3
The Allot-Optenet Parental Control Solution – Overview .......................................................................... 3
Scope ................................................................................................................................................... 3
Capabilities .......................................................................................................................................... 4
Functional Architectural........................................................................................................................ 6
Allot Service Gateway ..................................................................................................................... 6
Optenet MIDAS™ ............................................................................................................................ 6
Optenet GIANT™ ............................................................................................................................ 7
Monitoring and Provisioning Mechanisms ............................................................................................ 7
Benefits ..................................................................................................................................................... 8
Summary................................................................................................................................................... 8
About Allot................................................................................................................................................. 8
About Optenet ........................................................................................................................................... 8

© 2012 Allot Communications. All rights reserved.

2
Solution Brief:
Allot and Optenet Parental Control

Introduction
Consumer pressure and legislative directives – together with acknowledged social responsibility – have
led a wide range of service providers delivering broadband network, DSL, cable, and mobile services to
actively seek effective resolution of the frightening issues arising from uncontrolled Internet usage by
children and teenagers. The implications of access to inappropriate content are all very real and have
led parents to demand effective and easily-deployed solutions. Parents need tools through which they
can control their children’s Internet usage – on smartphones, Tablets or PCs – while allowing them to
provide equitable breath of usage.

Motivation
Parental Control applications must contend with the burgeoning number of potentially dangerous
websites and a host of related features.


Harmful and illegal content is spreading rapidly over the Internet, due to new technologies, higher
connection speeds, and a lack of unified regulation.



Penetration of mobile broadband technologies and the proliferation of devices such as smartphones
and tablets, expose children and teenagers to inappropriate content. Parents have almost no
control over their children’s cyber behavior.



Security threats including phishing, malware, and spyware are becoming very common, even in the
relatively closed mobile environment.

Today, most available parental-control solutions involve client-based software. However, the need for a
network based solution becomes evident when we consider the present situation:


Parents encounter difficulties to control, adjust limitations and receive information.



Users, even children, are becoming very knowledgeable and can learn how to bypass regular
client-based web filters.



Maintenance of client-based software is simply too complex for most people to contend with and
requires considerable resources on the part of the operator.



Regulations in many countries require service providers and telcos to take responsibility for
blocking harmful content.

The Allot-Optenet Parental Control Solution –
Overview
Scope
The Allot-Optenet Parental Control Solution ensures that children and teenagers have suitable
communication flexibility while providing active parent involvement over how and when various services
are available.
The Allot-Optenet Parental Control Solution is a network intelligence solution which acts as a single
centralized policy enforcement point within the network and can substantially improve an operator’s
© 2012 Allot Communications. All rights reserved.

3
Solution Brief:
Allot and Optenet Parental Control

competitive edge by enabling a feature-rich parental control solution. It fully ensures that a broad range
of home and mobile devices have secure and controlled browsing helping to make the Internet safe for
children.

Capabilities
The Allot-Optenet Parental Control Solution gives service providers a set of real-time tools to develop a
comprehensive package that allows parents to monitor their children’s Internet activity and take actions
by blocking unwanted access or limit usage during pre-determined periods.


URL filtering based on website categories: The Allot-Optenet Parental Control Solution includes
a database of millions of web sites (URLs) organized into a wide range of easy-to-use and logical
URL categories such as gambling, sports, pornography, ecommerce, news, entertainment, etc.
Parents can activate categories according to their personal outlook in regard to the scope of
browsing they wish to provide to their children. Children are prevented from accessing selected
categories of websites.



Real-time content filtering: The Allot-Optenet Parental Control Solution includes real-time
technology based upon artificial intelligence that continually updates thousands of addresses and
genetic algorithms. A high level of effectiveness is achieved with a minimal error rate.



File blocking: In addition to filtering web pages, the Allot-Optenet Parental Control Solution can
block various file types such as MP3, MPEG, AVI, EXE, and ZIP based not only on the file
extensions but also the digital fingerprints.



Blocking by protocol / application: The solution facilitates selective blocking of protocols such as
P2P, chat, instant messaging, etc. and/or applications using protocols such as eMule, MSN,
Webmail, etc.



Flexible rules policy: Additional rules (undesirable categories) can be incorporated into the
classification database of the Parental Control Solution. The user can then select the desired rule to
be used for the specific, monitored minor.



Multi-policy controls: The Solution supports the configuration of a number of parental control
policies (e.g. age-15, age-12), with each policy containing one or more classification categories. In
addition, parents can set detailed rules within the scope of the service provider-defined policy.



Online content inspection and filtering for uncategorized URLs: In cases when a website is not
available in the database, the Solution uses a dynamic categorization technique (i.e. content
inspection) to evaluate the category to which the website belongs and to apply the appropriate
policy rules.



Thwarting bypassing enforcement: The Parental Control Solution provides capabilities to prevent
bypassing of the enforcement system by precluding use of anonymous IDs and access to web sites
by IP address rather by DNS name.



Access control and QoS combined with DPI: Allot offers high-performance quality of service
(QoS) and access control that is both flexible and scalable. Allot’s Deep Packet Inspection engine
analyzes data packets in real-time, searching for applications and protocols that do not comply with
the subscriber’s access rules in order to decide whether to drop or pass the relevant packets.

© 2012 Allot Communications. All rights reserved.

4
Solution Brief:
Allot and Optenet Parental Control

Additionally, QoS options can be defined for application-related traffic to allow differentiated SLA
traffic prioritization or rate limiting.


Scheduled filtering: The Allot-Optenet Solution supports the definition of time-based filtering
policies for individuals or groups of users.



Opt-in and Opt-out: Parents can choose to temporarily opt out of the system at any time. The
parental control policy can be reactivated after a configured time or at a specific time of day.



Custom whitelist/blacklist management: Operators can create and import custom lists of
acceptable or unacceptable websites according to government regulations. Individual users are
able to configure their private filtering lists.



Multiple add-on security services. The Allot-Optenet Solution can provide additional security
services to allow the delivery of a “clean Internet pipe” to subscribers. The Solution includes an
extensive range of tools to combat phishing activity, web-based viruses and malware threats, as
well as effective protection against malicious content.



Cloud-based filtering service: The Allot-Optenet Solution can be delivered over the cloud,
eliminating technological and financial barriers in terms of value creation and the ability to scale. By
virtualizing complex data management involved in the filtering processes, operators are distanced
from unnecessary complexities and given the ability to painlessly leverage technological
developments.



Self-care portal: The Solution provides a user self-care portal, based on unique multi-tenant
technology, such that a user can customize permitted or restricted categories for their own parental
control policy. By using the self-care portal, parents can easily set rules, adjust them, if needed, and
receive usage reports.
This end-user portal can be customized with the operator’s look and feel and/or be integrated with
any operator’s end-user portal.



Online unblocking service: The solution provides an online revision and unblocking system. If
users do not agree with the categorization of a specific website, they can request that Optenet
review the content of the website and consider re-categorization. The process involves less than
fifteen minutes. Optenet notifies the user by email of its decision.

© 2012 Allot Communications. All rights reserved.

5
Solution Brief:
Allot and Optenet Parental Control

Functional Architectural
The components of the Allot-Optenet Parental Control Solution are described in the following sections.

Figure 1: Parental Control Solution Architecture

Allot Service Gateway
The Allot-Optenet Parental Control Solution is based on the Allot Service Gateway layer-7 steering
mechanism which facilitates surgical redirection of relevant traffic, which has been pre-classified to a
certain policy, based upon subscriber identity (not only an IP address). Relevant web traffic, that has
been specifically pre-selected as requiring parental control as part of the traffic policy, is steered to the
Optenet MIDAS™ web filter.
All traffic, related to parental control service users, is filtered according to browsing behavior and video
streaming in the following fashion:


The Service Gateway automatically identifies traffic that belongs to a user who has subscribed to
parental controls (based on the identification of the subscriber’s service plan).



The Service Gateway steers only the subscriber’s web traffic to the Optenet MIDAS web filter. The
rest of the traffic is forwarded to the Internet.



The subscriber’s web traffic is analyzed by the Optenet MIDAS web filter which decides whether to
block access to the requested content or to forward the traffic to the Service Gateway and then to
the internet.

Optenet MIDAS™
Optenet MIDAS™ (Multicontent Inspection and Dynamic Analysis System) is an intelligent data analysis
system that enables Optenet to classify multilingual and multi-format web content. Optenet MIDAS™
adds traces to numerous types of data (text, images, videos, etc.) present in web pages and e-mails,
and uses machine learning techniques to build multidimensional models that make it possible to classify
target content.
The Optenet MIDAS™ system is made up of three main parts, each responsible for one facet of the
process. This division of tasks makes it possible to conduct an intelligent analysis in real time without
increasing latency, thus leaving the output of the main system unaffected.

© 2012 Allot Communications. All rights reserved.

6
Solution Brief:
Allot and Optenet Parental Control



Analysis of multilingual and multi-format content. The Content Analysis Engine performs
statistical compilation of traces from the raw content.



Multi-content inspection. The Multi-Content Learner performs an inspection process which
involves the automatic creation of models that condense information relevant to the traces and the
relationship between them.



Automatic content classification. The Automatic Content Classifier makes use of the generated
models and the analysis results from new content to classify it in an effective and efficient manner.

Optenet MIDAS™ makes it possible to understand the structure of Internet content at a very deep level,
with unrivalled efficiency. The result is a content filtering systems that conducts real-time analysis in
order to respond to the challenges that the dynamic character of Web 2.0 creates for security system
administrators.
In short, children can access a truly “clean pipe” which transparently protects them from cyber-criminals
and inappropriate content. Furthermore, web threats such as spyware, Trojans, viruses, worms, and
phishing are fully handled without the need of additional software or impacting quality of experience.

Optenet GIANT™
Optenet GIANT™ (Global Intelligence Acquisition Network for Threats) continually receives inputs from
internet sources, including honey pots, probes, spider networks, crawlers, link topology analysis, etc.
and thus provides real-time, on-line content analysis and threat detection.

Monitoring and Provisioning Mechanisms
The Allot-Optenet Parental Control Solution allows subscribers to remotely configure their children’s
profiles through a user-friendly web-based GUI. It provides access to particular websites based on the
following parameters:


Time of day: e.g. access is allowed from 5:00 PM to 8:00 PM. Access will be blocked at other
times.



Number of hours per day: e.g. maximum number of permitted hours per day is 4.



Permitted applications: e.g., Instant Messaging and P2P applications are not allowed.



Blocking website categories: e.g., adult entertainment, extreme violence, gambling, racism, etc.
are blocked.



Blocking specific URLs: e.g., access to www.illegal.com is blocked.



URL whitelist: access to specific sites only is allowed. Access to all other sites is blocked.



Allow access to specified websites: e.g., access only to www.disney .com.

In addition, The Allot-Optenet Parental Control Solution has a twofold reporting mechanism. It alerts the
child when access is not permitted, and that a particular service is suspended or restricted. The child is
always a part of the solution and is thus encouraged to take responsibility for usage. Allot’s Solution also
delivers text-based notices (SMS messages) to parents about commencement of service restrictions
due to attempted violations. This permits parents to deal with such issues in an edifying and didactic
manner.

© 2012 Allot Communications. All rights reserved.

7
Solution Brief:
Allot and Optenet Parental Control

Operators can also provide extensive non-real-time reporting on usage of a child’s account via a
comprehensive monitoring tool. Parent can view details dealing with attempts to access restricted sites,
applications, etc.

Benefits


New revenue streams through the Parental Controls service offering.



Improved public image and increased customer loyalty, reducing subscriber churn.



Compliance with growing regulations requiring operators to provide network-based parental controls
services.



.



End-to-end filtering and security services combined with per-subscriber QoS.



Seamless implementation requiring no software or equipment in customers’ premises.



Centralized network-based solutions. Reduces maintenance costs enabling a pay-as-you-grow
model according to the number of subscribers.



Reduced service deployment and operating costs by improved VAS performance through layer-7
steering capabilities.

Summary
It is quite common today for fourth or fifth grade children to have mobile phones. These children are
incapable of understanding the implications of these devices. Parental restraints provided within the
scope of The Allot-Optenet Parental Control Solution enables parents to decide on the nature and limits
of content and applications that can be used and viewed by their children based upon time of day,
permitted/restricted applications, permitted/restricted website categories, etc. Allot delivers effective
content filtering based upon age groups, nature of content, and usage controls.

About Allot
Allot Communications Ltd. provides intelligent IP service optimization and revenue generation
solutions for fixed and mobile broadband operators and large enterprises. Allot’s rich portfolio of
solutions leverages Dynamic Actionable Recognition Technology to transform broadband pipes into
smart networks that can rapidly and efficiently deploy value-added Internet services. Allot’s scalable,
carrier-grade solutions provide the visibility, topology awareness, security, application control and
subscriber management that are vital to managing Internet service delivery, enhancing user experience,
containing operating costs, and maximizing revenue in broadband networks.

About Optenet
Optenet is a global IT security company and provider of high-performance content filtering solutions.
Optenet’s technology protects more than 120 million end users around the globe, including customers of
many of the world’s leading ISPs and mobile operators, as well as employees of global enterprise

© 2012 Allot Communications. All rights reserved.

8
Solution Brief:
Allot and Optenet Parental Control

organizations. With over a decade of security expertise, Optenet leads the industry with the most
advanced technology for dynamic content protection providing the highest rate of accuracy with
unparalleled protection against Web 2.0 threats. As a socially conscious organization, Optenet is
committed to eliminating illegal content on the Internet, protecting children, and supporting government
agencies and non-profit organizations that share the same goal.

© 2012 Allot Communications. All rights reserved.

9
www.allot.com info@allot.com
Americas: 300 TradeCenter, Suite 4680, Woburn, MA 01801 USA - Tel: 781-939-9300; Toll free: 877-255-6826; Fax: 781-939-9393
Europe: NCI–Les Centres d'Affaires Village d'Entreprises, 'Green Side' 400 Avenue Roumanille, BP309 06906 Sophia Antipolis,
Cedex France - Tel: 33 (0) 4-93-001160; Fax: 33 (0) 4-93-001165
Asia Pacific: 6 New Industrial Road, #08-01, Hoe Huat Industrial Building, Singapore 536199 · Tel: +65-6283 8990 · Fax: +65-6282 7280
Japan: Kanda Surugadai 4-2-3-301, Chiyoda-ku, Tokyo 101-0062 - Tel: 81 (3) 5297 7668; Fax: 81 (3) 5297 7669
Middle East & Africa: 22 Hanagar Street, Industrial Zone B, Hod Hasharon, 45240 Israel - Tel: 972 (9) 761-9200; Fax: 972 (9) 744-3626

More Related Content

What's hot

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsOnlineCompliance Panel
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Russ Holmes
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
2020 dsar expert reference guide
2020   dsar expert reference guide2020   dsar expert reference guide
2020 dsar expert reference guideAnkitKumar250429
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
K Ziai Share Point At Ut
K Ziai Share Point At UtK Ziai Share Point At Ut
K Ziai Share Point At UtArt Upton
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.comjonhson198
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comrobertlesew8
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 

What's hot (20)

CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'ts
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14Centrifuge Systems Overview 2 14
Centrifuge Systems Overview 2 14
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
2020 dsar expert reference guide
2020   dsar expert reference guide2020   dsar expert reference guide
2020 dsar expert reference guide
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
K Ziai Share Point At Ut
K Ziai Share Point At UtK Ziai Share Point At Ut
K Ziai Share Point At Ut
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
HIPAA Security Risk Assessment
HIPAA Security Risk Assessment HIPAA Security Risk Assessment
HIPAA Security Risk Assessment
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 

Viewers also liked

Net Solutions Drupal Development Brochure
Net Solutions Drupal Development BrochureNet Solutions Drupal Development Brochure
Net Solutions Drupal Development BrochureNet Solutions
 
Net2Vic: Subject, opens, clicks - oh my! An email discussion panel
Net2Vic:  Subject, opens, clicks - oh my! An email discussion panelNet2Vic:  Subject, opens, clicks - oh my! An email discussion panel
Net2Vic: Subject, opens, clicks - oh my! An email discussion panelNetSquared Victoria
 
The Global Economy No. 2 - February 16, 2012
The Global Economy No. 2 -  February 16, 2012The Global Economy No. 2 -  February 16, 2012
The Global Economy No. 2 - February 16, 2012Swedbank
 
Paperfox kiadvany 2014_web_interactive_medium
Paperfox kiadvany 2014_web_interactive_mediumPaperfox kiadvany 2014_web_interactive_medium
Paperfox kiadvany 2014_web_interactive_mediumZoltán Fürcht
 
Cap04 el consumidor cuc_2012 (1)
Cap04 el consumidor cuc_2012 (1)Cap04 el consumidor cuc_2012 (1)
Cap04 el consumidor cuc_2012 (1)Carmen Hevia Medina
 
Islamic way of worship week 1,2 & 3
Islamic way of worship week 1,2 & 3Islamic way of worship week 1,2 & 3
Islamic way of worship week 1,2 & 3isoccleveland
 
Sitios blindados de SharePoint
Sitios blindados de SharePointSitios blindados de SharePoint
Sitios blindados de SharePointwww.encamina.com
 
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarksVauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarksMumtaz Hannah Vauhkonen
 
Testing your applications with mbunit
Testing your applications with mbunitTesting your applications with mbunit
Testing your applications with mbunitBen Hall
 
Allef mobi iş fırsat sunumu
Allef mobi iş fırsat sunumuAllef mobi iş fırsat sunumu
Allef mobi iş fırsat sunumuBilal Ozdemir
 
Hip hop y desarrollo
Hip hop y desarrolloHip hop y desarrollo
Hip hop y desarrollosorrowize
 
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011cletachira
 
Odisha agriculture policy 2013 guideline for subsidy for finance, subsidy &...
Odisha agriculture policy 2013 guideline for subsidy   for finance, subsidy &...Odisha agriculture policy 2013 guideline for subsidy   for finance, subsidy &...
Odisha agriculture policy 2013 guideline for subsidy for finance, subsidy &...Radha Krishna Sahoo
 

Viewers also liked (20)

Net Solutions Drupal Development Brochure
Net Solutions Drupal Development BrochureNet Solutions Drupal Development Brochure
Net Solutions Drupal Development Brochure
 
Medioymedio
MedioymedioMedioymedio
Medioymedio
 
Net2Vic: Subject, opens, clicks - oh my! An email discussion panel
Net2Vic:  Subject, opens, clicks - oh my! An email discussion panelNet2Vic:  Subject, opens, clicks - oh my! An email discussion panel
Net2Vic: Subject, opens, clicks - oh my! An email discussion panel
 
HV: YULIET CARMONA
HV: YULIET CARMONAHV: YULIET CARMONA
HV: YULIET CARMONA
 
The Global Economy No. 2 - February 16, 2012
The Global Economy No. 2 -  February 16, 2012The Global Economy No. 2 -  February 16, 2012
The Global Economy No. 2 - February 16, 2012
 
Paperfox kiadvany 2014_web_interactive_medium
Paperfox kiadvany 2014_web_interactive_mediumPaperfox kiadvany 2014_web_interactive_medium
Paperfox kiadvany 2014_web_interactive_medium
 
Introduccion
IntroduccionIntroduccion
Introduccion
 
Cap04 el consumidor cuc_2012 (1)
Cap04 el consumidor cuc_2012 (1)Cap04 el consumidor cuc_2012 (1)
Cap04 el consumidor cuc_2012 (1)
 
Valores vectorespropios-productointerno-cuadraticas
Valores vectorespropios-productointerno-cuadraticasValores vectorespropios-productointerno-cuadraticas
Valores vectorespropios-productointerno-cuadraticas
 
Islamic way of worship week 1,2 & 3
Islamic way of worship week 1,2 & 3Islamic way of worship week 1,2 & 3
Islamic way of worship week 1,2 & 3
 
Sitios blindados de SharePoint
Sitios blindados de SharePointSitios blindados de SharePoint
Sitios blindados de SharePoint
 
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarksVauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
 
Fiskalni program pos sector
Fiskalni program pos sectorFiskalni program pos sector
Fiskalni program pos sector
 
DealerLink Demo
DealerLink DemoDealerLink Demo
DealerLink Demo
 
Testing your applications with mbunit
Testing your applications with mbunitTesting your applications with mbunit
Testing your applications with mbunit
 
Allef mobi iş fırsat sunumu
Allef mobi iş fırsat sunumuAllef mobi iş fırsat sunumu
Allef mobi iş fırsat sunumu
 
Hip hop y desarrollo
Hip hop y desarrolloHip hop y desarrollo
Hip hop y desarrollo
 
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011
Informe Dirección de Consultoría Jurídica CLET I Trimestre 2011
 
Guía de Magazine Factory
Guía de Magazine FactoryGuía de Magazine Factory
Guía de Magazine Factory
 
Odisha agriculture policy 2013 guideline for subsidy for finance, subsidy &...
Odisha agriculture policy 2013 guideline for subsidy   for finance, subsidy &...Odisha agriculture policy 2013 guideline for subsidy   for finance, subsidy &...
Odisha agriculture policy 2013 guideline for subsidy for finance, subsidy &...
 

Similar to Allot Optenet Parental Control: Solution Brief

Cloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsCloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
Whitepaper For Open Gp
Whitepaper For Open GpWhitepaper For Open Gp
Whitepaper For Open Gphansfrisvold
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan EssayKristi Anderson
 
10 Most Effective Big Data Technologies
10 Most Effective Big Data Technologies10 Most Effective Big Data Technologies
10 Most Effective Big Data TechnologiesMahindra Comviva
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
The top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfThe top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfVertexplus Technologies
 
Avco Systems SCC Creating Single View
Avco Systems SCC Creating Single ViewAvco Systems SCC Creating Single View
Avco Systems SCC Creating Single Viewxband
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxanitramcroberts
 
Accounting Information System ch 01 ppt1
Accounting Information System ch 01 ppt1Accounting Information System ch 01 ppt1
Accounting Information System ch 01 ppt1Eloise Mae Hersane
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014Ravindran Vasu
 

Similar to Allot Optenet Parental Control: Solution Brief (20)

Cloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsCloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from Patents
 
e-HealthWhitepaper
e-HealthWhitepapere-HealthWhitepaper
e-HealthWhitepaper
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Whitepaper For Open Gp
Whitepaper For Open GpWhitepaper For Open Gp
Whitepaper For Open Gp
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan Essay
 
10 Most Effective Big Data Technologies
10 Most Effective Big Data Technologies10 Most Effective Big Data Technologies
10 Most Effective Big Data Technologies
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
The top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfThe top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdf
 
Avco Systems SCC Creating Single View
Avco Systems SCC Creating Single ViewAvco Systems SCC Creating Single View
Avco Systems SCC Creating Single View
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Security Authorization Strategy
Security Authorization StrategySecurity Authorization Strategy
Security Authorization Strategy
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
 
Accounting Information System ch 01 ppt1
Accounting Information System ch 01 ppt1Accounting Information System ch 01 ppt1
Accounting Information System ch 01 ppt1
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 

More from Allot Communications

Securing people and things a monetization opportunity
Securing people and things a monetization opportunitySecuring people and things a monetization opportunity
Securing people and things a monetization opportunityAllot Communications
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...Allot Communications
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Communications
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Allot Communications
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues Allot Communications
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceAllot Communications
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot Communications
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Communications
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Communications
 

More from Allot Communications (11)

Securing people and things a monetization opportunity
Securing people and things a monetization opportunitySecuring people and things a monetization opportunity
Securing people and things a monetization opportunity
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have?
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Allot Optenet Parental Control: Solution Brief

  • 1. Allot Communications Solutions Allot and Optenet Parental Control Solution Brief vbvbv © Allot Communications. All rights reserved. May 2012
  • 2. Solution Brief: Allot and Optenet Parental Control Table of Contents Introduction ............................................................................................................................................... 3 Motivation.................................................................................................................................................. 3 The Allot-Optenet Parental Control Solution – Overview .......................................................................... 3 Scope ................................................................................................................................................... 3 Capabilities .......................................................................................................................................... 4 Functional Architectural........................................................................................................................ 6 Allot Service Gateway ..................................................................................................................... 6 Optenet MIDAS™ ............................................................................................................................ 6 Optenet GIANT™ ............................................................................................................................ 7 Monitoring and Provisioning Mechanisms ............................................................................................ 7 Benefits ..................................................................................................................................................... 8 Summary................................................................................................................................................... 8 About Allot................................................................................................................................................. 8 About Optenet ........................................................................................................................................... 8 © 2012 Allot Communications. All rights reserved. 2
  • 3. Solution Brief: Allot and Optenet Parental Control Introduction Consumer pressure and legislative directives – together with acknowledged social responsibility – have led a wide range of service providers delivering broadband network, DSL, cable, and mobile services to actively seek effective resolution of the frightening issues arising from uncontrolled Internet usage by children and teenagers. The implications of access to inappropriate content are all very real and have led parents to demand effective and easily-deployed solutions. Parents need tools through which they can control their children’s Internet usage – on smartphones, Tablets or PCs – while allowing them to provide equitable breath of usage. Motivation Parental Control applications must contend with the burgeoning number of potentially dangerous websites and a host of related features.  Harmful and illegal content is spreading rapidly over the Internet, due to new technologies, higher connection speeds, and a lack of unified regulation.  Penetration of mobile broadband technologies and the proliferation of devices such as smartphones and tablets, expose children and teenagers to inappropriate content. Parents have almost no control over their children’s cyber behavior.  Security threats including phishing, malware, and spyware are becoming very common, even in the relatively closed mobile environment. Today, most available parental-control solutions involve client-based software. However, the need for a network based solution becomes evident when we consider the present situation:  Parents encounter difficulties to control, adjust limitations and receive information.  Users, even children, are becoming very knowledgeable and can learn how to bypass regular client-based web filters.  Maintenance of client-based software is simply too complex for most people to contend with and requires considerable resources on the part of the operator.  Regulations in many countries require service providers and telcos to take responsibility for blocking harmful content. The Allot-Optenet Parental Control Solution – Overview Scope The Allot-Optenet Parental Control Solution ensures that children and teenagers have suitable communication flexibility while providing active parent involvement over how and when various services are available. The Allot-Optenet Parental Control Solution is a network intelligence solution which acts as a single centralized policy enforcement point within the network and can substantially improve an operator’s © 2012 Allot Communications. All rights reserved. 3
  • 4. Solution Brief: Allot and Optenet Parental Control competitive edge by enabling a feature-rich parental control solution. It fully ensures that a broad range of home and mobile devices have secure and controlled browsing helping to make the Internet safe for children. Capabilities The Allot-Optenet Parental Control Solution gives service providers a set of real-time tools to develop a comprehensive package that allows parents to monitor their children’s Internet activity and take actions by blocking unwanted access or limit usage during pre-determined periods.  URL filtering based on website categories: The Allot-Optenet Parental Control Solution includes a database of millions of web sites (URLs) organized into a wide range of easy-to-use and logical URL categories such as gambling, sports, pornography, ecommerce, news, entertainment, etc. Parents can activate categories according to their personal outlook in regard to the scope of browsing they wish to provide to their children. Children are prevented from accessing selected categories of websites.  Real-time content filtering: The Allot-Optenet Parental Control Solution includes real-time technology based upon artificial intelligence that continually updates thousands of addresses and genetic algorithms. A high level of effectiveness is achieved with a minimal error rate.  File blocking: In addition to filtering web pages, the Allot-Optenet Parental Control Solution can block various file types such as MP3, MPEG, AVI, EXE, and ZIP based not only on the file extensions but also the digital fingerprints.  Blocking by protocol / application: The solution facilitates selective blocking of protocols such as P2P, chat, instant messaging, etc. and/or applications using protocols such as eMule, MSN, Webmail, etc.  Flexible rules policy: Additional rules (undesirable categories) can be incorporated into the classification database of the Parental Control Solution. The user can then select the desired rule to be used for the specific, monitored minor.  Multi-policy controls: The Solution supports the configuration of a number of parental control policies (e.g. age-15, age-12), with each policy containing one or more classification categories. In addition, parents can set detailed rules within the scope of the service provider-defined policy.  Online content inspection and filtering for uncategorized URLs: In cases when a website is not available in the database, the Solution uses a dynamic categorization technique (i.e. content inspection) to evaluate the category to which the website belongs and to apply the appropriate policy rules.  Thwarting bypassing enforcement: The Parental Control Solution provides capabilities to prevent bypassing of the enforcement system by precluding use of anonymous IDs and access to web sites by IP address rather by DNS name.  Access control and QoS combined with DPI: Allot offers high-performance quality of service (QoS) and access control that is both flexible and scalable. Allot’s Deep Packet Inspection engine analyzes data packets in real-time, searching for applications and protocols that do not comply with the subscriber’s access rules in order to decide whether to drop or pass the relevant packets. © 2012 Allot Communications. All rights reserved. 4
  • 5. Solution Brief: Allot and Optenet Parental Control Additionally, QoS options can be defined for application-related traffic to allow differentiated SLA traffic prioritization or rate limiting.  Scheduled filtering: The Allot-Optenet Solution supports the definition of time-based filtering policies for individuals or groups of users.  Opt-in and Opt-out: Parents can choose to temporarily opt out of the system at any time. The parental control policy can be reactivated after a configured time or at a specific time of day.  Custom whitelist/blacklist management: Operators can create and import custom lists of acceptable or unacceptable websites according to government regulations. Individual users are able to configure their private filtering lists.  Multiple add-on security services. The Allot-Optenet Solution can provide additional security services to allow the delivery of a “clean Internet pipe” to subscribers. The Solution includes an extensive range of tools to combat phishing activity, web-based viruses and malware threats, as well as effective protection against malicious content.  Cloud-based filtering service: The Allot-Optenet Solution can be delivered over the cloud, eliminating technological and financial barriers in terms of value creation and the ability to scale. By virtualizing complex data management involved in the filtering processes, operators are distanced from unnecessary complexities and given the ability to painlessly leverage technological developments.  Self-care portal: The Solution provides a user self-care portal, based on unique multi-tenant technology, such that a user can customize permitted or restricted categories for their own parental control policy. By using the self-care portal, parents can easily set rules, adjust them, if needed, and receive usage reports. This end-user portal can be customized with the operator’s look and feel and/or be integrated with any operator’s end-user portal.  Online unblocking service: The solution provides an online revision and unblocking system. If users do not agree with the categorization of a specific website, they can request that Optenet review the content of the website and consider re-categorization. The process involves less than fifteen minutes. Optenet notifies the user by email of its decision. © 2012 Allot Communications. All rights reserved. 5
  • 6. Solution Brief: Allot and Optenet Parental Control Functional Architectural The components of the Allot-Optenet Parental Control Solution are described in the following sections. Figure 1: Parental Control Solution Architecture Allot Service Gateway The Allot-Optenet Parental Control Solution is based on the Allot Service Gateway layer-7 steering mechanism which facilitates surgical redirection of relevant traffic, which has been pre-classified to a certain policy, based upon subscriber identity (not only an IP address). Relevant web traffic, that has been specifically pre-selected as requiring parental control as part of the traffic policy, is steered to the Optenet MIDAS™ web filter. All traffic, related to parental control service users, is filtered according to browsing behavior and video streaming in the following fashion:  The Service Gateway automatically identifies traffic that belongs to a user who has subscribed to parental controls (based on the identification of the subscriber’s service plan).  The Service Gateway steers only the subscriber’s web traffic to the Optenet MIDAS web filter. The rest of the traffic is forwarded to the Internet.  The subscriber’s web traffic is analyzed by the Optenet MIDAS web filter which decides whether to block access to the requested content or to forward the traffic to the Service Gateway and then to the internet. Optenet MIDAS™ Optenet MIDAS™ (Multicontent Inspection and Dynamic Analysis System) is an intelligent data analysis system that enables Optenet to classify multilingual and multi-format web content. Optenet MIDAS™ adds traces to numerous types of data (text, images, videos, etc.) present in web pages and e-mails, and uses machine learning techniques to build multidimensional models that make it possible to classify target content. The Optenet MIDAS™ system is made up of three main parts, each responsible for one facet of the process. This division of tasks makes it possible to conduct an intelligent analysis in real time without increasing latency, thus leaving the output of the main system unaffected. © 2012 Allot Communications. All rights reserved. 6
  • 7. Solution Brief: Allot and Optenet Parental Control  Analysis of multilingual and multi-format content. The Content Analysis Engine performs statistical compilation of traces from the raw content.  Multi-content inspection. The Multi-Content Learner performs an inspection process which involves the automatic creation of models that condense information relevant to the traces and the relationship between them.  Automatic content classification. The Automatic Content Classifier makes use of the generated models and the analysis results from new content to classify it in an effective and efficient manner. Optenet MIDAS™ makes it possible to understand the structure of Internet content at a very deep level, with unrivalled efficiency. The result is a content filtering systems that conducts real-time analysis in order to respond to the challenges that the dynamic character of Web 2.0 creates for security system administrators. In short, children can access a truly “clean pipe” which transparently protects them from cyber-criminals and inappropriate content. Furthermore, web threats such as spyware, Trojans, viruses, worms, and phishing are fully handled without the need of additional software or impacting quality of experience. Optenet GIANT™ Optenet GIANT™ (Global Intelligence Acquisition Network for Threats) continually receives inputs from internet sources, including honey pots, probes, spider networks, crawlers, link topology analysis, etc. and thus provides real-time, on-line content analysis and threat detection. Monitoring and Provisioning Mechanisms The Allot-Optenet Parental Control Solution allows subscribers to remotely configure their children’s profiles through a user-friendly web-based GUI. It provides access to particular websites based on the following parameters:  Time of day: e.g. access is allowed from 5:00 PM to 8:00 PM. Access will be blocked at other times.  Number of hours per day: e.g. maximum number of permitted hours per day is 4.  Permitted applications: e.g., Instant Messaging and P2P applications are not allowed.  Blocking website categories: e.g., adult entertainment, extreme violence, gambling, racism, etc. are blocked.  Blocking specific URLs: e.g., access to www.illegal.com is blocked.  URL whitelist: access to specific sites only is allowed. Access to all other sites is blocked.  Allow access to specified websites: e.g., access only to www.disney .com. In addition, The Allot-Optenet Parental Control Solution has a twofold reporting mechanism. It alerts the child when access is not permitted, and that a particular service is suspended or restricted. The child is always a part of the solution and is thus encouraged to take responsibility for usage. Allot’s Solution also delivers text-based notices (SMS messages) to parents about commencement of service restrictions due to attempted violations. This permits parents to deal with such issues in an edifying and didactic manner. © 2012 Allot Communications. All rights reserved. 7
  • 8. Solution Brief: Allot and Optenet Parental Control Operators can also provide extensive non-real-time reporting on usage of a child’s account via a comprehensive monitoring tool. Parent can view details dealing with attempts to access restricted sites, applications, etc. Benefits  New revenue streams through the Parental Controls service offering.  Improved public image and increased customer loyalty, reducing subscriber churn.  Compliance with growing regulations requiring operators to provide network-based parental controls services.  .  End-to-end filtering and security services combined with per-subscriber QoS.  Seamless implementation requiring no software or equipment in customers’ premises.  Centralized network-based solutions. Reduces maintenance costs enabling a pay-as-you-grow model according to the number of subscribers.  Reduced service deployment and operating costs by improved VAS performance through layer-7 steering capabilities. Summary It is quite common today for fourth or fifth grade children to have mobile phones. These children are incapable of understanding the implications of these devices. Parental restraints provided within the scope of The Allot-Optenet Parental Control Solution enables parents to decide on the nature and limits of content and applications that can be used and viewed by their children based upon time of day, permitted/restricted applications, permitted/restricted website categories, etc. Allot delivers effective content filtering based upon age groups, nature of content, and usage controls. About Allot Allot Communications Ltd. provides intelligent IP service optimization and revenue generation solutions for fixed and mobile broadband operators and large enterprises. Allot’s rich portfolio of solutions leverages Dynamic Actionable Recognition Technology to transform broadband pipes into smart networks that can rapidly and efficiently deploy value-added Internet services. Allot’s scalable, carrier-grade solutions provide the visibility, topology awareness, security, application control and subscriber management that are vital to managing Internet service delivery, enhancing user experience, containing operating costs, and maximizing revenue in broadband networks. About Optenet Optenet is a global IT security company and provider of high-performance content filtering solutions. Optenet’s technology protects more than 120 million end users around the globe, including customers of many of the world’s leading ISPs and mobile operators, as well as employees of global enterprise © 2012 Allot Communications. All rights reserved. 8
  • 9. Solution Brief: Allot and Optenet Parental Control organizations. With over a decade of security expertise, Optenet leads the industry with the most advanced technology for dynamic content protection providing the highest rate of accuracy with unparalleled protection against Web 2.0 threats. As a socially conscious organization, Optenet is committed to eliminating illegal content on the Internet, protecting children, and supporting government agencies and non-profit organizations that share the same goal. © 2012 Allot Communications. All rights reserved. 9
  • 10. www.allot.com info@allot.com Americas: 300 TradeCenter, Suite 4680, Woburn, MA 01801 USA - Tel: 781-939-9300; Toll free: 877-255-6826; Fax: 781-939-9393 Europe: NCI–Les Centres d'Affaires Village d'Entreprises, 'Green Side' 400 Avenue Roumanille, BP309 06906 Sophia Antipolis, Cedex France - Tel: 33 (0) 4-93-001160; Fax: 33 (0) 4-93-001165 Asia Pacific: 6 New Industrial Road, #08-01, Hoe Huat Industrial Building, Singapore 536199 · Tel: +65-6283 8990 · Fax: +65-6282 7280 Japan: Kanda Surugadai 4-2-3-301, Chiyoda-ku, Tokyo 101-0062 - Tel: 81 (3) 5297 7668; Fax: 81 (3) 5297 7669 Middle East & Africa: 22 Hanagar Street, Industrial Zone B, Hod Hasharon, 45240 Israel - Tel: 972 (9) 761-9200; Fax: 972 (9) 744-3626