網路不當資訊防堵面面觀
description
Transcript of 網路不當資訊防堵面面觀
![Page 2: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/2.jpg)
AgendaAgenda
網際網路上的不當資訊網際網路上的不當資訊
不當資訊防堵解決方案簡介不當資訊防堵解決方案簡介
Pass-ThroughPass-Through 與與 Pass-ByPass-By 防堵技術之比較防堵技術之比較
成熟的不當資訊防堵系統之必備條件成熟的不當資訊防堵系統之必備條件
相關產品比較相關產品比較
實機展示實機展示
Q & AQ & A
![Page 3: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/3.jpg)
![Page 4: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/4.jpg)
Source SexTracker
What percentage of
internet porn
is downloaded
from 9 to 5?
![Page 5: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/5.jpg)
70%
![Page 6: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/6.jpg)
IDC Research
What percentage of
workplace
Internet surfing
is not business related?
![Page 7: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/7.jpg)
40%
![Page 8: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/8.jpg)
WordTracker.com
What are the top 3 word searches on the
internet?MP3
Hotmail
Sex
![Page 9: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/9.jpg)
![Page 10: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/10.jpg)
Key Features
Comprehensive MRMAnalyzes, Reports and Manages
Internet Access
Master Database DrivenBetter categorizationNo keyword “overblocking”Automatic daily updates
Server-basedMulti-platform supportNo client-side maintenanceP
LA
TF
OR
MS
SY
ST
EM
CO
RE
AP
PL
ICA
TIO
N
MO
DU
LE
S
![Page 11: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/11.jpg)
How Does it Work?
Permitted Request
Blocked Request
ActivityMonitor
Reports & Analysis
Updated Daily
User
Monitor usage Graphical reports Customizable
management
Written Policy +Rules Set-upIn Websense
WebsenseEnterprise
INTERNET
INTERNET
DATABASE
Firewall, Cache Appliance or Proxy Server
![Page 12: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/12.jpg)
Pass-Through Technology
![Page 13: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/13.jpg)
Pass-Through Technology(續 )
![Page 14: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/14.jpg)
Pass-By Technology
![Page 15: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/15.jpg)
Pass-By Technology(續 )
![Page 16: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/16.jpg)
Pass-Through vs. Pass-By
Reliability
Scalability
![Page 17: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/17.jpg)
成熟的不當資訊防堵系統之必備條件Over-Block vs. Under-Block
Database CoverageDatabase Accuracy
Flexible Policy ManagementPermit/BlockQuotaTime of dayPassword overrideDeferUsername/Group
Powerful ReportsCentralized Filtering Policy ManagementIntegration with Most Firewall/Proxy/Cache
![Page 18: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/18.jpg)
相關產品比較
![Page 19: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/19.jpg)
![Page 20: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/20.jpg)
實機展示H/W Configuration
CPU: Pentium III 700RAM: 512 MBHD: 20 GB
S/W ConfigurationMicrosoft Windows 2000 Server SP2Microsoft ISA Server 2000 Enterprise EditionWebsense Enterprise 4.4Websense Reporter 6.3
![Page 22: 網路不當資訊防堵面面觀](https://reader036.fdocument.pub/reader036/viewer/2022062517/56813a28550346895da20be7/html5/thumbnails/22.jpg)
The Top Ranked Product in EIM: Websense (www.websense.com)
The Top Ranked Product in EIM: Websense (www.websense.com)
“ When you’re ready to buy, we recommend
Websense…”— ZDNet
“Websense offers the right combination of a rich feature set and easy
administration.”— Internet Computing
“Websense is a blocking and filtering powerhouse.”
— PC Magazine
“ When you’re ready to buy, we recommend
Websense…”— ZDNet
“Websense offers the right combination of a rich feature set and easy
administration.”— Internet Computing
“Websense is a blocking and filtering powerhouse.”
— PC Magazine
SIFTSIFTFounding
Member of Secure Internet Filtering
Technology Consortia