SlideShare une entreprise Scribd logo
1  sur  18
GATEWALL
DNS FILTER
Filtering traffic by DSN requests
SECURITY ISSUES

 Over 90% of viruses infect your machine via the Internet
 The number of infected websites keeps growing
 The number of new websites grows exponentially

 The growing popularity of social network brought new types of fraud
          designed to obtain t a victim’s personal information.



It is often difficult to distinguish a phishing website from a normal site.
ENTENSYS DATABASE VS FREEWARE ANALOGS
Blocking websites that contain phishing links, Trojans, keyloggers,
botnets and malicious software



                                                               Some 100,000
                                        3,280,000                 new websites
                                                                  are added daily
                                                                  Information on
                                                                  malware
                                                                  websites comes
                                        5,035,000
                                                                  from multiple
          322,000                                                 sources

    Google Safe Browsing API      UserGate DNS Filtering DB

       Known malware websites
      Известные сайты с malware   Сайты reputation websites
                                   Poor с низкой репутацией
DYNAMIC APPROACH BENEFITS
PORN SITE CREATION EXAMPLE:
1. Create a website about butterflies
2. Classify the website as an educational page about animals (dynamics
and statics)
3. Replace content with pornography
4. With static approach, the site will be categorized as a site about animals
5. With dynamic approach, its category will be changed to Porno


      DYNAMIC APPROACH                            STATIC APPROACH
   Some 100,000 websites get modified      Category updates are rare
    every day                               As a rule, the update process is
    Information on malware websites          launched manually
    comes from multiple sources
    Database contains around 500
    million websites
    Database is kept constantly updated
EMPLOYEE EFFICIENCY

 24% of the sites that office employees visit are social network sites
 Around 55% of website requests are not related to their work
 The main goal of a social network is to make a user spends as much time
   as possible on the website



  Companies with 20 to 100 employees show the highest percentage of
                     unwarranted Internet usage.



 HOWEVER, such primitive restrictions as keyword blocking or black and
  white lists may have a negative effect on employees’ performance.
GATEWALL DNS FILTER – THE SOLUTION


    Uses SaaS model (Software-as-a-Service)
    Filters websites (500 mln URL database)
    Protects from malicious software
    Generates Internet usage reports and statistics




    Internet usage monitoring
    Increased Internet security
    Less unwanted traffic
    Better employee performance
ARCHITECTURE
HOW DOES IT WORK?

   Denial by categories (82 categories with 500 mln websites)

   Black and white lists

   White list inclusion request web-form

   Website category modification request web-form

   Advanced fail-safety

   Web statistics (reports)
BLOCKING URL CATEGORIES

        An administrator may easily configure the application to block
        sites belonging to the following categories:



 Porn sites                           Social networks
 Malware websites                     Torrents and P2P networks
 Online gambling sites                Gaming and entertainment
                                         portals
 Proxy servers and anonymizers
CUSTOMIZABLE BLACK AND WHITE LISTS



                               Some websites are blocked
White lists guarantee access
                               regardless of other network
to certain websites
                               settings
REPORTS
 Statistics by hits and categories
 Lists of blocked websites
POTENTIAL USERS
PUBLIC INSTITUTIONS                     SMALL- AND MIDSIZED
   Schools                             BUSINESSES
   Social insurance agencies              Banks
   Tax inspectorate offices               Insurance companies
   Municipal and regional                 Mining companies
    administrations                        Distribution networks
                                            Etc.



INTERNET SERVICE
PROVIDERS                               GateWall DNS Filter:
    Home networks                      A handy tool that allows Internet usage
    Second-tier ISPs                   control in companies of any size and
    Large ISPs                         companies with a spread out
    Business centers                   infrastructure
   * Individual approach to each ISP
PUBLIC INSTITUTIONS

 Schools and other                         Social insurance agencies
   educational institutions                 Retirement funds




Internet access at schools is one of the   Public Internet services
priority tasks of governments in many      Every year, many projects are
countries.                                 launched that involve different
These projects in almost all cases         technologies and require the use of the
require Internet usage at schools to be    Internet. Hence the requirement to
monitored.                                 control and secure Internet access.
SMALL- AND MIDSIZED BUSINESSES
 Proactive protection                     Employee
                                             performance




                                          Allocation of Internet traffic by
 Websites from the most dangerous
                                          categories, time and date. Websites
 categories are blocked (Spyware,
                                          that are not related to work (including
 Malware, Adult, Porno, Social
                                          social networks, online gaming portals,
 Networks, etc.). Category listings are
                                          etc.) are blocked. This helps improve
 constantly updated.
                                          employee performance.




Copyright © 2009 Entensys Corporation
INSTALLATION AND INTEGRATION

   Each project is reviewed individually

   Compatible with Microsoft NLB (Network Load Balancing)

   Flexible billing system (monthly or annual billing)

   API for integration with ISP’s billing system

   API for rules management from client account page

   Integration assistance
SIMPLE SOLUTION

    Cloud-based model

 GateWall DNS Filter does not require local installation of any hardware or
    software solutions

 The program remembers the current network mapping, security settings
    and processes executed by all existing applications

 URL database updates run in the background and do not interfere with
    the users’ work
SOME ALTERNATIVES

OpenDNS
A solution for large- and midsized companies
and schools (K-12 schools)




WebSense Hosted Web Security
One of the world’s top vendors of information security
solutions
ENTENSYS COMPANY
   Founded in 2001
   Offices in Moscow, Novosibirsk, Leipzig (Germany)
   Staff: more than 40 employees
   More details about the company and other products: http://www.entensys.com/

  STRATEGIC PARTNERS




Kaspersky Lab       Panda                BrightCloud        Commtouch
Russia              Security             USA                Israel
                    Spain

Contenu connexe

Tendances

Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka zigix
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Product Innovation Award 2009
Product Innovation Award 2009Product Innovation Award 2009
Product Innovation Award 2009Kim Jensen
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 

Tendances (20)

Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Product Innovation Award 2009
Product Innovation Award 2009Product Innovation Award 2009
Product Innovation Award 2009
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 

En vedette

Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksYuri Neshitov
 
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseenTutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseenHeikki Sairanen
 
PrePatent Auction eng
PrePatent Auction engPrePatent Auction eng
PrePatent Auction engYuri Neshitov
 
Final startup for startups
Final startup for startupsFinal startup for startups
Final startup for startupsYuri Neshitov
 
Tieto ja viestintäteknologiaan
Tieto  ja viestintäteknologiaanTieto  ja viestintäteknologiaan
Tieto ja viestintäteknologiaanHeikki Sairanen
 
London walks 2011
London walks 2011London walks 2011
London walks 2011Jokedm
 
Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksYuri Neshitov
 

En vedette (8)

Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's Risks
 
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseenTutkijatapaaminen   työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
 
PrePatent Auction eng
PrePatent Auction engPrePatent Auction eng
PrePatent Auction eng
 
Final startup for startups
Final startup for startupsFinal startup for startups
Final startup for startups
 
Tieto ja viestintäteknologiaan
Tieto  ja viestintäteknologiaanTieto  ja viestintäteknologiaan
Tieto ja viestintäteknologiaan
 
Tepe uusi kalvopohja
Tepe   uusi kalvopohjaTepe   uusi kalvopohja
Tepe uusi kalvopohja
 
London walks 2011
London walks 2011London walks 2011
London walks 2011
 
Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's RisksHybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's Risks
 

Similaire à GateWall DNS Filter

What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptxMinnySkyy
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security  Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security Imperva Incapsula
 
Incapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website SecurityIncapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website SecurityImperva Incapsula
 

Similaire à GateWall DNS Filter (20)

What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security  Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Drupal Websites Security
 
Incapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website SecurityIncapsula: Boosting Joomla Website Security
Incapsula: Boosting Joomla Website Security
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

GateWall DNS Filter

  • 2. SECURITY ISSUES  Over 90% of viruses infect your machine via the Internet  The number of infected websites keeps growing  The number of new websites grows exponentially The growing popularity of social network brought new types of fraud designed to obtain t a victim’s personal information. It is often difficult to distinguish a phishing website from a normal site.
  • 3. ENTENSYS DATABASE VS FREEWARE ANALOGS Blocking websites that contain phishing links, Trojans, keyloggers, botnets and malicious software  Some 100,000 3,280,000 new websites are added daily  Information on malware websites comes 5,035,000 from multiple 322,000 sources Google Safe Browsing API UserGate DNS Filtering DB Known malware websites Известные сайты с malware Сайты reputation websites Poor с низкой репутацией
  • 4. DYNAMIC APPROACH BENEFITS PORN SITE CREATION EXAMPLE: 1. Create a website about butterflies 2. Classify the website as an educational page about animals (dynamics and statics) 3. Replace content with pornography 4. With static approach, the site will be categorized as a site about animals 5. With dynamic approach, its category will be changed to Porno DYNAMIC APPROACH STATIC APPROACH  Some 100,000 websites get modified  Category updates are rare every day  As a rule, the update process is  Information on malware websites launched manually comes from multiple sources  Database contains around 500 million websites  Database is kept constantly updated
  • 5. EMPLOYEE EFFICIENCY  24% of the sites that office employees visit are social network sites  Around 55% of website requests are not related to their work  The main goal of a social network is to make a user spends as much time as possible on the website Companies with 20 to 100 employees show the highest percentage of unwarranted Internet usage. HOWEVER, such primitive restrictions as keyword blocking or black and white lists may have a negative effect on employees’ performance.
  • 6. GATEWALL DNS FILTER – THE SOLUTION  Uses SaaS model (Software-as-a-Service)  Filters websites (500 mln URL database)  Protects from malicious software  Generates Internet usage reports and statistics  Internet usage monitoring  Increased Internet security  Less unwanted traffic  Better employee performance
  • 8. HOW DOES IT WORK?  Denial by categories (82 categories with 500 mln websites)  Black and white lists  White list inclusion request web-form  Website category modification request web-form  Advanced fail-safety  Web statistics (reports)
  • 9. BLOCKING URL CATEGORIES An administrator may easily configure the application to block sites belonging to the following categories:  Porn sites  Social networks  Malware websites  Torrents and P2P networks  Online gambling sites  Gaming and entertainment portals  Proxy servers and anonymizers
  • 10. CUSTOMIZABLE BLACK AND WHITE LISTS Some websites are blocked White lists guarantee access regardless of other network to certain websites settings
  • 11. REPORTS  Statistics by hits and categories  Lists of blocked websites
  • 12. POTENTIAL USERS PUBLIC INSTITUTIONS SMALL- AND MIDSIZED  Schools BUSINESSES  Social insurance agencies  Banks  Tax inspectorate offices  Insurance companies  Municipal and regional  Mining companies administrations  Distribution networks  Etc. INTERNET SERVICE PROVIDERS GateWall DNS Filter:  Home networks A handy tool that allows Internet usage  Second-tier ISPs control in companies of any size and  Large ISPs companies with a spread out  Business centers infrastructure  * Individual approach to each ISP
  • 13. PUBLIC INSTITUTIONS  Schools and other  Social insurance agencies educational institutions  Retirement funds Internet access at schools is one of the Public Internet services priority tasks of governments in many Every year, many projects are countries. launched that involve different These projects in almost all cases technologies and require the use of the require Internet usage at schools to be Internet. Hence the requirement to monitored. control and secure Internet access.
  • 14. SMALL- AND MIDSIZED BUSINESSES  Proactive protection  Employee performance Allocation of Internet traffic by Websites from the most dangerous categories, time and date. Websites categories are blocked (Spyware, that are not related to work (including Malware, Adult, Porno, Social social networks, online gaming portals, Networks, etc.). Category listings are etc.) are blocked. This helps improve constantly updated. employee performance. Copyright © 2009 Entensys Corporation
  • 15. INSTALLATION AND INTEGRATION  Each project is reviewed individually  Compatible with Microsoft NLB (Network Load Balancing)  Flexible billing system (monthly or annual billing)  API for integration with ISP’s billing system  API for rules management from client account page  Integration assistance
  • 16. SIMPLE SOLUTION  Cloud-based model  GateWall DNS Filter does not require local installation of any hardware or software solutions  The program remembers the current network mapping, security settings and processes executed by all existing applications  URL database updates run in the background and do not interfere with the users’ work
  • 17. SOME ALTERNATIVES OpenDNS A solution for large- and midsized companies and schools (K-12 schools) WebSense Hosted Web Security One of the world’s top vendors of information security solutions
  • 18. ENTENSYS COMPANY  Founded in 2001  Offices in Moscow, Novosibirsk, Leipzig (Germany)  Staff: more than 40 employees  More details about the company and other products: http://www.entensys.com/ STRATEGIC PARTNERS Kaspersky Lab Panda BrightCloud Commtouch Russia Security USA Israel Spain