Internet Behavior Management
Internet behavior management is to help Internet users control and manage the use of the Internet, including web access filtering, network application control, bandwidth traffic management, messaging audit and user behavior analysis.
Internet behavior management products and technologies are designed to prevent the malicious spread of illegal information and avoid the leakage of confidential information, business information and scientific research results, and able to conduct real-time monitoring and management of network resource usage and improve overall efficiency. Internet behavior management products are suitable for the network environment that needs an implementation of contents audit, behavior monitoring and behavior management, particularly for the related units or departments that conduct hierarchically computer information system security protection.
With the rapid development of computer, broadband technology, the network office become increasingly popular and the Internet has become essential, convenient and efficient tool while people work, live and learn. However, with the convenience brought by computer office and the Internet, at the same time the phenomenon of employees’ non-working Internet becomes increasingly prominent and enterprises exist commonly serious problems of computer and internet abuse. Online shopping, online chat, enjoying music and movies online, P2P tools download and other non-work-related behavior takes up limited bandwidth, seriously affecting the normal work efficiency.
The online behavior management solutions provided by Tianjin Raresoft take the prevention beforehand, real-time monitoring and afterwards tracing as main idea, to regulate network behavior, improve work efficiency; identifying the enterprise's core applications to avoid the interference of the enterprise's core network application and ensure the use value of network resources; reducing security risks and avoiding legal risks to prevent the legal risks brought by releasing harmful information of endangering national security and social stability, propagandizing ethnic separatist, cults, pornography, fraud etc..
1. Internet Personnel Management
Internet Identity Management: Using IP / MAC identification method, the user name / password authentication method and domain control method to ensure accurate identification and the legitimacy of internet personnel.
Internet Terminal Management: Checking the legitimacy of the host’s registry, processes and hard disk files to ensure the legality and security of terminal PC’s access to the corporate network.
Mobile Terminal Management: Checking mobile terminal identification code, identifying the type and model of intelligent mobile terminal to ensure the legality of the mobile terminal’s access to the corporate network.
Internet Site Management: Checking Internet terminal’s physical access point and identifying Internet sites to ensure the legality of Internet sites.
2. Internet Browsing Management
Search Engine Management: Using the identifying, recording and blocking techniques of keywords in search box to ensure the legality of Internet search content and avoid the negative impact of improper keyword search.
Website URL Management: Using a web classification database technology to beforehand conduct the classification and identifying, recording and blocking of the massive site, to ensure the legitimacy of the internet access site.
Webpage Text Management: Using the identifying, recording and blocking techniques of text keyword to ensure the legitimacy of the browsed text.
File Download Management: Using the identifying, recording and blocking techniques of the name, size and type of files and download frequency to ensure the legitimacy of the file downloaded in webpage.
3. Internet Outgoing Mail Management
Regular Mail Management: Using the deep identification, recording and blocking of receiver and sender, title, body, attachments and attachment content to ensure the legitimacy of outgoing mails.
WEB Mail Management: Using the deep identification, recording and blocking of receiver and sender, title, body, attachments and attachment content of WEB mailbox to ensure the legitimacy of outgoing mails.
Web Posting Management: Using the identifying, recording and blocking of the title and text keywords of the posted content on websites such as BBS, to ensure the legitimacy of the outgoing speech.
IM Management: Using the identifying, recording and blocking of the keywords of outgoing content by QQ, Skype, flying letters and other mainstream IM to ensure the legitimacy of the outgoing speech.
Other Outgoing Mail Management: For the outgoing messages with FTP, TELNET and other protocol traditional, conducting the identification, recording and blocking of content keywords to ensure the legitimacy of the outgoing message.
4. Internet Application Management
Internet Application Blocking: By the use of application protocol libraries that do not rely on ports to conduct the identification and blockage of application.
Internet Applications Cumulative Duration Limit: When the distributed cumulative duration or one-day cumulative duration of each or several applications reaches the limit, the access will be automatically terminated.
Internet Applications Cumulative Traffic Limit: When the distributed cumulative traffic or one-day cumulative traffic of each or several applications reaches the limit, the access will be automatically terminated.
5. Internet Traffic Management
Internet Bandwidth Control: To set virtual channel top limit for each or several applications and discard the traffic that exceeds the top limit.
Internet Bandwidth Guarantees: Setting virtual channel low limit for each or several applications to ensure that critical applications retain the necessary network bandwidth.
Internet Bandwidth Borrowing: When there are multiple virtual channels, allowing full-capacity virtual channels to borrow bandwidth from other free virtual channels.
Internet Bandwidth Averaging: Allocating physical bandwidth to each user on average, to avoid individual user taking up too much traffic and preempt other user's bandwidth.
6. Internet Behavior Analysis
Internet Behavior Real-time Monitoring: To display uniformly the current speed, bandwidth allocation, applications distribution, personnel bandwidth and personnel applications of the network.
Internet Behavior Log Query: Precisely query the network personnel, terminal, location, Internet browsing, Internet outgoing, Internet applications, Internet traffic and other acts log to pinpoint precisely problems.
Internet Behavior Statistical Analysis: Collecting and summarizing the network logs to make intuitive reports based on the statistical analysis of traffic trends, risk trends, leaks trends and efficiency trends, so that managers can easily identify potential problems globally.
7. Internet Privacy Protection
Log Transmission Encryption: Managers use SSL-encrypted tunnel to access to the device's local log database and external log center, to prevent hackers from eavesdropping.
Separation of Management Powers: The built-in administrator, auditor, comptroller accounts. Administrators have no right to check logs, but can set the auditor account; auditors have no right to check logs, but can open the auditor’s authority after auditing the legality of the auditor’s authority; comptrollers can not set their own log checking range, but can check the contents of the specified logs after the auditor has passed the auditing of his authority.
Accurate Logging: All Internet behavior can be selectively recorded based on filtering criteria, those that are not illegal do need to be recorded, recording a minimum of privacy.
8. Risk Centralized Alarm
Alarm Center: All alarms can be displayed uniformly on the alarm center page.
Hierarchical Alarms: Distinguish and arrange different levels of alarm to prevent low-level alarms flooding key high-level alarms.
Alarm Notification: Alarms are by e-mail and voice prompt to notify the administrator so as to rapidly discover the risk of alarm.