Avatar of Matt Coughlin
Matt CoughlinFlag for United States of America

asked on 

Internet Activity Monitoring Device

I am looking for a device that will track internet usage by our office users. It will need to have AD integration if possible and be able to track which websites were visited when and for how long. I am currently running an Untangle server as a firewall but the reporting feature shows EVERYTHING that the user's computer hits on the internet (such as windows update and banner ads, etc.). Looking for a better solution. I was thinking about software installed on each client machine to monitor this, but I would like to have a network device track this if possible. Anyone have any ideas or suggestions? Thanks.
Hardware FirewallsNetwork AnalysisSecurity

Avatar of undefined
Last Comment
Matt Coughlin
Avatar of Paul MacDonald
Paul MacDonald
Flag of United States of America image

I'm pretty sure a proxy is your only bet.  Can you not filter the information you get from Untangle?
Avatar of Fidelius
Fidelius
Flag of Croatia image

Hello,

One of solutions could be Blue Coat ProxySG - http://www.bluecoat.com/products/proxysg
There is lot of HW solutions of this type from McAfee, IronPort, and others.

Regards!
 
ASKER CERTIFIED SOLUTION
Avatar of lancecurwensville
lancecurwensville
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

ASKER

Thanks for your replies I will check these suggestions out.

@paulmacd
I can filter the data from untangle but it has to be line by line and only if you know what your looking at. The reports I am after are for non-technical viewers. :-(
I see.  Well I can't say what your options are regarding proxies, but I'm sure there are many out there that will fit your bill nicely.
SOLUTION
Avatar of Fidelius
Fidelius
Flag of Croatia image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

ASKER

Wow Splunk is a great program! Unfortuneatly it does not translate the logs from untangle very well. I am looking into the netspective now. I have a demo scheduled and we will see if this is the right fit for our situation. Thanks a bunch.
Avatar of Fidelius
Fidelius
Flag of Croatia image

Splunk is very powerful and flexible. You can create you own data types in it. It can parse any log it can read. In some cases you just need to train Splunk to learn how to parse. If netspective won't be right fit, send example logs from Untangle, so I will try to parse them, and help set your version with right setup.

Regards!
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

ASKER

Netspective demo tomorrow. Will close question once I have settled on a solution.
SOLUTION
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

ASKER

I gave points to everyone that had a solution based on my requirements. I included my own comment because the solution chosen was not one that anyone suggested.
Avatar of Matt Coughlin
Matt Coughlin
Flag of United States of America image

ASKER

Thanks everyone for your help.
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo