Best Hardware or Saftware App for secure URL/Content/IM filtering

Posted on 2005-03-16
Medium Priority
Last Modified: 2013-12-04
Need some idea's and links to hardware or software sites.

Cisco PiX firewall always and option? what version and add-ons?

ISA server 2004 is already an option.

Our company is looking to install a software App or hardware device that can filter or stop:
Hopefully it can tie in with active directory!
We want reports of activities. So it must have a decent reporting engine.

Internet/content filtering  by user/IP.
IM usage by user or program. We wan to stop this completely for some.
Log reports of users signing on and off of a station/IP etc,etc,etc

Basically something that can give it all to us. If there is sucha device I'll be floored!

Question by:ConSolIT
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 38

Accepted Solution

Rich Rumble earned 1000 total points
ID: 13558969
There are a few seperate programs that do what your asking... i've not seen anything short of "spy" programs that do most of this, and they don't work with AD.
Ntop can break-down traffic by certain protocols, such as SMTP, HTTP, Kazaa and many more. There is an ntop client for M$ from openextra but I'm not sure if it's as updated as the linux development is. http://www.ntop.org/overview.html http://www.openxtra.co.uk/products/ntop-xtra.php

Content can be applied to users in a certain group via internet explorer's content advisor... but if they have an alternate browser they can by-pass this.
Proxy servers are probably the best way to accomplish this.
You can use Snort or another IDS to report on keywords in emails, IM's or most any other plain-text messaging system. you can block various IM protocols with a proxy easily.

Assisted Solution

Kipski earned 1000 total points
ID: 13560832
Have a look at WinGate:  http://www.wingate.com   It is a software proxy server...

It has a good monitoring/logging capability.  It also has a firewall which is highly customisable and can be configured at user level, which sounds exactly like what you are after....  It provides proxy services for all of the likely services you will require, including web, ftp, eMail and many others..

This is a cracking piece of software and it can be used in conjunction with any hardware you may wish to purchase in addition.  For example, I have a hardware firewall/router and I also run the WinGate Server software.


Author Comment

ID: 13560916
Very good!
Yes We currently have 4 layers of security for internal users. Routers and Pix fiwewalls are all cisco based. We want to add another layer for Web defense and control managment.

Expert Comment

ID: 13745927
There are some UNIX based firewalls that we use for Web Site Security. We use those because they are not affected by the MS problems with security.

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month13 days, 4 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question