Clearswift SECURE Web Gateway Evaluation Guide

Size: px
Start display at page:

Download "Clearswift SECURE Web Gateway Evaluation Guide"

Transcription

1 Clearswift SECURE Web Gateway Evaluation Guide Revision 1.1

2 Introduction Thank you for taking the time to evaluate the Clearswift SECURE Web Gateway. Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth. The Clearswift SECURE Web Gateway is a trusted internet security solution for your web gateway that does just that. The SECURE Web Gateway s policy-based content-filtering engine allows your organisation to both exploit and benefit from modern web technologies and services, while ensuring that the company network remains fully protected against incoming threats and data leakage. With the Web Gateway deployed, the web is transformed from a high-risk environment to a place of free and safe collaboration and communication. Business-enhancing online technologies, like webmail, social-media websites and collaborative services, can therefore be enabled with confidence. This evaluation guide explores and explains some of the many benefits of the SECURE Web Gateway. Rather than overwhelm you with an in-depth analysis of every feature our intention is to present the essential information that will allow you to continue to explore and evaluate of SECURE Web Gateway at your own pace. Note that this guide assumes that you have already followed the Clearswift SECURE Web Gateway Getting Started Guide. As such, you should have completed the Initial Setup Wizard and be able to log in to SECURE Web Gateway. If this is not the case then the Getting Started Guide can be found on the Technical Guides area of the Clearswift website please read it before proceeding. We ll start with a brief overview of what you can expect to see the graphical user interface. As that s a bit of a mouthful, we ll call it the GUI from here on. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

3 The GUI When you first log in you will be presented with this Home page: The Home page is the starting point for managing SECURE Web Gateway s features and for implementing and maintaining an Acceptable Usage Policy (AUP) for your organisation. It is supported by a further five pages, or Management Centers, displayed as tabs across the top of the GUI Policy, Reports, System, Health and Users. Let s take a closer look at these... Here s a close-up of the six tabs used to navigate SECURE Web Gateway just click on one to access the associated features. The Home page presents an overview of SECURE Web Gateway. It is the first page displayed each time you log in. The Policy Center lets you define and maintain an Acceptable Usage Policy (AUP) for your organisation. This involves creating rules to manage information flowing in to and out of your organisation. Use the Policy Center to block the viewing of particular websites, for example, or to allow specific users access to certain types of content. The Report Center provides access to the monitoring capabilities of SECURE Web Gateway. It collates and presents information on the activities of users, from websites visited to time spent online. As well, the Report Center tracks bandwidth use and detected threats, like malware and phishing sites. The System Center is used to manage some of the more technical aspects of SECURE Web Gateway. The most important settings will have been configured during the Initial Setup Wizard, so there s not too much to worry about with this Center. However, they can be edited from here at any time. The Health Center is the place to view real-time usage information for SECURE Web Gateway. Key metrics available here include number of concurrent connections, bandwidth use and the number of threats prevented from entering the organisation.

4 The Users Center control access to the aforementioned Management Centers. Use it to create new administrative users, allowing access to all or selected Management Centers. This evaluation guide will focus on the most important Management Centers, offering simple guidelines on making the most of them. Before proceeding, though, take pause for a brief (if mildly technical) tip. When evaluating SECURE Web Gateway it can be useful to have two web browsers available. Why? Well, it will help you to better understand the differing experiences of users and administrators. Configuring, say, Internet Explorer, to use SECURE Web Gateway as its proxy will simulate the users experience. Then, use Firefox to access the Management Centers without the proxy to understand how administrators will work. Policy centre We ll start by exploring the Web Policy Routes page, in the Policy Center. We will examine SECURE Web Gateway s default policy and gain an understanding of the policy options. POLICY FEATURES NTLM and Kerberos authentication Flexible and granular policy construction for users, departmental groups, machines and IP addresses Time and quota user web access rights Acceptable usages inform pages BENEFIT To identify users transparently so that individuals or departmental groups can have unique aspects of the policy applied and reporting can be specific to an individual or department. Easily define advanced policies to enable and allow Web 2.0 usage while minimizing risk. Define both times of day and total amount of time per day a user may browse the web. Inform pages highlight individual web usage is being monitored and is subject to company policy. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

5 To begin, click the Policy tab. Now select Web Policy Routes from the submenu to view SECURE Web Gateway s default policy. Here s what you should see: At first glance there s a lot to take in here but the information is actually very easy to read. The rows represent different types of web content or routes. Notice that access to some routes is allowed (indicated by green Allow symbols), while other routes are blocked (red Block symbols). SECURE Web Gateway s default policy blocks some routes because the content from these categories may be considered inappropriate for the workplace. Blocked routes include Sexually Explicit, Violence/ Offensive, Weapons, Gambling and so forth. Of course, access to any or all of these routes can be allowed or blocked as desired. Regardless, SECURE Web Gateway s default policy provides a good starting place for creating an Acceptable Usage Policy for your organisation. It can also help to gain an understanding of SECURE Web Gateway s key features so let s try out aspects of the default policy right now. Notice that the default policy is to block content that fits the Weapons route. Moreover, Everyone is blocked from this route meaning all users. To see this in action, fire up the web browser configured for users (Internet Explorer, if you followed our earlier suggestion) and visit www. guns.com. SECURE Web Gateway intercepts the request and displays this block message in the browser window:

6 Now, blocking all users from accessing a particular type of web content will sometimes be wholly appropriate but it s a rather blunt tool. As an alternative, SECURE Web Gateway allows administrators to restrict some routes with a soft block. A soft block presents the user with the option to continue if required, but only after they have acknowledged the block page. This may be useful for routes that are blocked primarily for productivity reasons, helping users to respect your organisation s policy while affording them the freedom to continue with essential business. To see a soft block in action, use Internet Explorer to browse to www. gambling.com. This time, SECURE Web Gateway will present a soft block page, distinguished by the option to Continue Browsing : Now refer back to the Manage Policy Routes screenshot on the previous page. Examine it a little more closely and you ll notice that the block symbol on the Gambling route is complemented by a secondary symbol the soft block symbol. It looks like this: While we re focused more closely on this screen, you may spot another symbol a little clock: This clock symbol indicates that access to the relevant route is restricted by a time schedule, which could be specific hours during the day (the company lunch hour, say) or for a limited amount of time throughout the day. Note, too, that the Web Policy Routes screen summarises which users are allowed or denied access to particular routes. The default policy either blocks, soft blocks or allows Everyone. However, much more flexibility is possible. As we ll see later, it s possible, for example, to define specific user groups, such as Sales, Marketing and Finance, and apply different policies to the various departments within your organisation. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

7 Web Policy Routes & Content Rules SECURE Web Gateway policy routes are supported by content rules. These determine the content that is allowed to flow between the organisation and the websites defined by the route. Routes may have any number of content rules added, with seven applied by default. These are: Block Virus Block Encrypted Data Block Spyware Block Spyware Call Home Remove Tracking Cookie Block Executables including ActiveX Processing of requests or response Fails The presence of these default rules is indicated by the 7 in the Rules column on the Web Policy Routes screen. We ll explore rules in more detail in just a moment but before we proceed, notice that the Trusted Sites route lacks content rules. This means that the traffic flowing via the Trusted Sites route will not checked against any rules but this is intentional. The route exists as a place to categorise automatic update servers, such those used by Microsoft or Clearswift. Applying content rules to such servers, or indeed deleting this route, may cause any automatic updates to fail an undesirable situation. Let s take a closer look at how policy and rules work together. Click Show Printable Version on the left-hand side of the GUI. You should see something like this: Show printable version of policy Web Policy Routes are selected top down, first to match Content Rules are processed left to right

8 If SECURE Web Gateway detects web content that matches a particular rule then a block or allow action will be triggered. The content rules included with the default policy are all set to block. If the user attempts to access content that contravenes one of these rules then a block page will be shown in their web browser. Here, for instance, the user has attempted to download an executable file and has been blocked by the Block Executables including ActiveX content rule: As we ve already seen, SECURE Web Gateway s default policy includes a number of ready-made content rules for each route. However, it is simple to define new content rules or edit existing ones. We ll demonstrate by editing route number 8, which relates to Non-Business Related traffic. To do this, simply double-click the route or click once to highlight and then click the Edit button. Notice that the route has five editable sections: Overview, Traffic, Default Action, Schedule and Content Rules. The last four are the most important, so we ll explore these one at a time. Web Policy Route: Traffic The Traffic section is the key to building flexible policies. It is possible, for instance, to allow different groups within the organisation to have different rules applied to their browsing activity. The selected route, remember, is concerned with traffic between Everyone and websites considered Non-Business Related we call this an Internet Zone. This is how the Traffic section looks currently: Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

9 It is very easy to edit this route in order to apply it to different groups within the organisation or to different Internet Zones. To explore this further, click the Click here to change these setting link on the right. Here s what you ll see: Between Policy > User Names Policy > Machines And Policy > Internet Zones As you can see from the above screenshot, this particular SECURE Web Gateway has various departmental groups set up, such as Marketing, Product Management and Sales; and also a couple of groups based on machines, rather than departments. Of course, these are just examples to aid clarity: you will need to define your own groups. Changing the route is a simple case of placing ticks in the appropriate category boxes listed below the Between and And headings. To aid understanding, we ll consider the Between and And lists in a little more depth. Between User Name Lists and Machine Lists SECURE Web Gateway draws on Clearswift s renowned MIMEsweeper policy engine. This is a very powerful tool that can be used to specify granular policies for users grouped by department or even individuals. Grouping users by department offers both administrative simplicity and flexibility when setting policy for the many job functions within an organisation. An IT support department, for instance, may require unfettered access to large downloads or executable files, while marketing staff may be granted unrestricted use of social-networking websites and services. Groups also aid SECURE Web Gateway s powerful reporting features, because generated reports can be focused on the activities of specific departments. By the same token, the ability to apply policy right down to the level of individual users means an organisation has the freedom to fine-tune enforcement for job-specific needs. And Internet Zones As noted earlier, we refer to a route s destination as an Internet Zone. An Internet Zone is made up of one or more URL categories. The Non- Business Related Internet Zone, for example, includes URLs categorised as Gaming, Hobbies, Job Search, Personal Ads and Dating. Not all businesses are the same, of course, so you may wish to review the Non-Business Related Internet Zone in order select different nonbusiness categories. To do this, click the Policy tab at the top (to go to the Policy Center) and then select Internet Zones.

10 FEATURES URL FILTER CATEGORIES URL filter with Security Risk categories included Real-time categorisation Embedded URL Classification BENEFIT Prevents access to high risk Malware, Phishing, Remote Proxy and Hacking sites. Assigns a category to previously uncategorised sites in real-time to ensure undesirable content is prevented from entering the organisation. Provides a greater depth of analysis and categorisation for embedded URLs to categorise and prevent inappropriate content delivered from Google or Yahoo! cached pages. Web Policy Route: Action As we ve already seen, SECURE Web Gateway presents block pages when it detects content that contravenes policy. These are the result of Actions. The default Action for a route can be set to either Allow or Block the request. The default s policy s Non-Business Related route that we re exploring, for instance, is set to Allow but only during scheduled periods (and we ll cover SECURE Web Gateway s scheduling options in just a moment). Here s what it looks like: Again, it is easy to change the way this works. To block Non-Business Related browsing at all times, for example, hit the Click here to change these settings link and use the dropdown menus to choose Block the communicating using and Generic Route Block Page. Like this: Policy > End User & Block Pages Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

11 A handy tip here: to create a soft block, as discussed earlier, just place a tick in the box labelled Allow the user to continue browsing if they acknowledge the block page. Remember, this will still result in the user being presented with a block page, reminding them of your organisation s Acceptable Use Policy, but they will be offered the option to continue browsing. This is typical of the flexibility provided by SECURE Web Gateway, protecting your organisation while allowing employees freedom to conduct essential business. Web Policy Route: Schedule SECURE Web Gateway s schedule controls allow you to specify quotas or periods during which users can browse websites matching a particular route. Here, for example, is the schedule for the default policy s Non- Business Related route: Drag mouse to set time quota colour Select time quota colour before filling schedule The green cells indicate access is allowed but users will be unable to access the route during periods marked by white cells. The orange cells, incidentally, signify a period during which quotas apply. So, in this example, no access is allowed after 8am and before 5pm, Monday to Friday, but there is a three-hour window in the middle of the day when users are allowed up to 60 minutes access to web content covered by the route. A schedule like this helps keep minds focused on work during business hours, while affording freedom to conduct personal activities during lunch breaks.

12 Web Policy Route: Content Rules SECURE Web Gateway s content rules define the type of information that is allowed to flow to and from your organisation. It s possible, for example, to create a rule that allows Word and Excel documents to be downloaded but not uploaded limiting data leaks. We ll explore now how text within documents can also be examined, using SECURE Web Gateway s powerful Detect Lexical Expressions content rule. A common policy requirement is to prevent document uploads only when specific watermarks are detected within the document. Similarly, you may wish to scan documents uploads for other sensitive information such as credit card, National Insurance or Social Security numbers. Given their importance, let s explore content rules in more detail. Policy > Content Rules Ability to copy Content Rules from an existing Route to save time That completes the overview of the Web Policy Routes. We shall now explore the content rules in more detail. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

13 Content Rules SECURE Web Gateway s content rules provide the real-time protection when a website is being accessed. Their purpose is to examine all data that flows into and out of your organisation, protecting against known and unknown malware threats and performing deep, contentaware inspection. FEATURES HYGIENE AND CONTENT AWARE INSPECTION Bi-directional anti-malware scanning Bi-directional anti-spyware scanning Deep content-aware inspection True binary file-type identification Real-time categorisation Suspicious script detection BENEFIT Stops known and unknown malware infection, entering or leaving the network. Stops spyware, adware, key loggers and spyware call homes, and identifies infected user machines. The ability to look inside containers being uploaded or downloaded and detect and prevent policy violations even when the file type is embedded in other file types/containers. Provides accurate identification of file types, embedded attachments and direction. File identification is based on the binary type and NOT the file name or reported MIME type which can be misrepresented. Prevents undesirable content from new or uncategorised sites such as pornography. And prevent access to remote proxy sites that appear every day. Protection from web content that includes suspicious script commands.

14 SECURE Web Gateway includes comprehensive set of default content rules that have been set to detect various types of web content. To view them, click the Policy tab and then select Content Rules. This is what you ll see: Policy > Content Rues As noted, SECURE Web Gateway s powerful content rules make real-time decisions about the information that is allowed to flow into and out of your organisation. So, how do content rules apply in practical situations? Well, consider these three questions: Should a document containing the phrase top secret be allowed to leave the organisation? Should a document with multiple credit card numbers be allowed to leave the organisation? Should a virus-infected file, concealed within a compressed zip file, be allowed to enter the organisation? Most companies, of course, would answer a resounding No! to all three. And it is for exactly these kinds of situations that SECURE Web Gateway s content rules exist. The purpose of the content rules included as part of SECURE Web Gateway s default policy are reasonably self-explanatory and also demonstrate the power and depth Clearswift s content-inspection technology. Take Block Confidential Office Documents rule, for example: rather than place a block on the transfer of all documents, it inspects document content for words and phrases that may indicate the presence of confidential information. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

15 Editing the default content rules to reflect the specific needs of your organisation is straightforward as is creating rules from scratch. To see how this is done, click the Policy tab, select Content Rules and then click New. This is what you ll see: Policy > Content Rues > New All rules in SECURE Web Gateway including those provided with the default policy are built from a base set of content rules. This table provides an idea of how these base content rules were used to build the content rules that make up default policy.

16 To explain what s going on here, the leftmost column one lists SECURE Web Gateway s default content rules, while the middle column details the base rule on which each content rule was built. The right-hand column, by the way, shows the lexical expression list (if any) that the rule draws on. So, for example, the Block Confidential Office Documents rule has been built on the Detect Lexical Expressions base rule, and draws on the Confidential Material lexical expressions list. Of course, deciding which base content rule is the most appropriate for a particular policy depends on the desired outcome. However, it is fair to say that Detect Media Type and Detect Lexical Expressions are the most powerful and the most frequently used base rules. For example, if wanting to detect a particular data format or file type then use the Detect Media Type base rule. To scan for particular words or phrases, regardless of whether the focus is an upload, download, web page or URL, begin with the Detect Lexical Expression base rule. Let s consider a few examples of desired outcomes and see how they can be achieved by building on SECURE Web Gateway s base content rules: To prevent the usage of unauthorised browsers (Chrome, Safari, and Opera, for example), use the Detect Lexical Expression base content rule to search HTTP headers for the appropriate User Agent Header string. To stop the viewing of specific YouTube videos, use the Detect Lexical Expression base content rule to search requested URLs for the video s identification number. To prevent the upload of Microsoft Office documents (Word, Excel, etc), use the Detect Media Type base content rule and set the direction to Leaving the Company. To prevent data leaks, use the Detect Lexical Expression base content rule, set the direction to Leaving the Company and search for phrases such as Top Secret, Sensitive and Confidential. As we ve seen, all content rules reference other policy components, be it Block Pages or Lexical Expression Lists. These referenced items are referred to as Policy References and can be found on the lower part of the main policy page. We have already seen examples of how some of these Policy References can be used within the content rules and Web Policy Routes but here s a summary. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

17 Define user groups and use to specify the From on a Web Policy Route Define machine groups and use to specify the From on a Web Policy Route Define groups of websites by URL and category and use to specify the To on a Web Policy Route. Create or amend the pages used to inform users about policy violations. Create lists of words and phrases that can be used with the Lexical Expressions content rule to prevent data leaks. Create an inform to alert IT or HR immediately when a potential policy violation occurs. Identify your own internal servers to be categorised as Intranet Allows specific file names to be specified and used with the Detect File Names content rule. Tip: to stop certain files types use the Detect Media Types content rule to look for binary signatures. Reporting Clearswift SECURE Web Gateway includes versatile management and reporting facilities, all controlled from a simple web-based interface. Dozens of ready-made report templates are included and new ones can be created quickly and simply. Better still, SECURE Web Gateway s reports are interactive: drill down on the fly to get to the data you need quickly and avoid producing useless reports. FEATURES REPORTING Intuitive web-based interface Pre-defined customizable reports Scheduled reporting Multi-gateway policy and reporting Active Directory (AD) and LDAP integration Scheduled spyware reporting BENEFIT Ease of use and no requirement to learn complex syntax or Linux commands. Easy to modify, run and share reports with interactive drilldowns. Allows create once, run and distribute many times report circulation via . Consolidated policy and reporting view of user s activities for centralised management and analysis. Full user-based policy control for flexible policy and audit reporting by group or indi vidual. Better control of spyware and the identification of user devices requiring remediation.

18 We d suggest starting your evaluation of SECURE Web Gateway s reporting facilities using the reports grouped under the Route heading. To do this, click the Reports tab and followed by the + to expand the Route reports group. The Route reports show how the users web requests are being processed by the Web Policy Routes. As you will now appreciate, the Web Policy Routes represent the organisation s policy and the Route reports show how that policy is being processed, showing the most popular routes, users, time and bandwidth usage. Here s what it looks like: The provided reports display activity for all users. However, it is easy to create a new report that focuses on specific user groups or individuals. First select a report and click Copy. This will create a copy of the original report and place you in editing mode. This is what you can expect to see: From here you can rename the report, change the many report filters and even schedule the report for automatic delivery. The filters and their meaning should be self-explanatory. In order to produce reports focused on specific user groups ( Marketing or Sales, say), first create the necessary user lists and then use these in some policy routes. Clearswift SECURE Web Gateway Evaluation Guide / Revision 1.1

19 As mentioned, SECURE Web Gateway reporting system is interactive, so you can drill down on the fly. To see this in action, first run the Top Routes to Top Categories report. Now, to drill down on a particular route, simply click on the route in the report screen. Drill down still further by clicking a category like this: Tip: After drilling down into a report, use the Back button in the web browser to return to the previous level. Note that when doing this, it may be necessary to press F5 to have the browser refresh the page. We hope that this brief guide has given you a head start in your evaluation of Clearswift SECURE Web Gateway. Of course, there s plenty more to explore. For more help or guidance either follow the links below or simply give us a call we d love to hear from you. For further information Technical Guides: resources/technical-guides Clearswift knowledge base: Technical Support: Clearswift user discussion forums:

20 Contact Clearswift UK - International HQ Clearswift Limited 1310 Waterside Arlington Business Park Theale Reading Berkshire RG7 4SA UK Tel : +44 (0) Fax : +44 (0) Sales: +44 (0) Technical Support: +44 (0) info@clearswift.com Australia Clearswift 5th Floor 165 Walker Street North Sydney New South Wales, 2060 AUSTRALIA Tel : Fax : info@clearswift.com.au Germany Clearswift GmbH Amsinckstrasse Hamburg GERMANY Tel : Fax : info@clearswift.de Japan Clearswift K.K 7F Hanai Bldg Shibakouen, Minato-ku, Tokyo JAPAN Tel : +81 (3) Fax : +81 (3) info.jp@clearswift.co.jp Spain Clearswift España S.L. Cerro de los Gamos 1, Edif Pozuelo de Alarcón Madrid SPAIN Tel : / Fax : info.es@clearswift.com United States Clearswift Corporation 161 Gaither Drive Centerpointe Suite 101 Mt. Laurel, NJ UNITED STATES Tel : Fax : info@us.clearswift.com

Essential Steps to Web Security. A Clearswift Best Practice Guide

Essential Steps to Web Security. A Clearswift Best Practice Guide Essential Steps to Web Security A Clearswift Best Practice Guide Introduction Web 2.0 brings Threat 2.0 The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online

More information

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6. Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG

More information

SECURE Web Gateway Sizing Guide

SECURE Web Gateway Sizing Guide Technical Guide Version 02 26/02/2015 Contents Introduction... 3 Overview... 3 Example one... 4 Example two... 4 Maximum throughput... 4 Gateway Reporter... 4 Gateway Reporter server specification... 5

More information

Clearswift SECURE File Gateway

Clearswift SECURE File Gateway Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment,

More information

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware

More information

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000 800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed

More information

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security

More information

Securing Microsoft Office 365

Securing Microsoft Office 365 Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering

More information

CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption

CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption Introduction This Technical FAQ explains the functionality of the optional HTTPS/SSL scanning and inspection module available for the Web Gateway and

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Application Control and URL Filtering

Application Control and URL Filtering Application Control and URL Filtering R77 Versions Administration Guide 17 May 2015 Classification: [Protected] 2015 Check Point Software Technologies Ltd. All rights reserved. This product and related

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Security Awareness Research 5 November 2010

Security Awareness Research 5 November 2010 Security Awareness Research 5 November 2010 31% of data breaches happen as a result of frustrations with IT security policy restricting employees from doing their job Foreword I am delighted to introduce

More information

Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway Clearswift SECURE Email Gateway Version 3.2 Evaluation Guide Revision 1.0 1 Introduction Thank you for taking the time to evaluate Clearswift SECURE Email Gateway. Modern business simply couldn t function

More information

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12 SECURE Web Gateway HTTPS/SSL Technical FAQ Version 1.1 Date 04/10/12 Introduction This Technical FAQ explains the operation of the HTTPS/SSL scanning and how it is deployed. How does the SECURE Web Gateway

More information

LabTech Integration Instructions

LabTech Integration Instructions LabTech Integration Instructions Overview... 2 Requirements... 2 Webroot Activation... 3 Plug-In Installation... 5 Global Site Manager Integration... 6 Usage... 8 Information by Computer/Device... 8 Reference...

More information

Essential Steps to Web Security. A Clearswift Best-Practice Guide

Essential Steps to Web Security. A Clearswift Best-Practice Guide Essential Steps to Web Security A Clearswift Best-Practice Guide Introduction Web 2.0 brings Threat 2.0. The web is changing fast from a one-way medium for brochure-ware to a highly interactive, sophisticated

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Web Reporter Turning volumes of data into actionable intelligence McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009 Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy

More information

Presentation Reporting Quick Start

Presentation Reporting Quick Start Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Quickstart guide to Configuring WebTitan

Quickstart guide to Configuring WebTitan Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Web DLP Quick Start. To get started with your Web DLP policy

Web DLP Quick Start. To get started with your Web DLP policy 1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Getting Started with TRITON Mobile Security

Getting Started with TRITON Mobile Security 1 Getting Started with TRITON Mobile Security Welcome to Websense TRITON Mobile Security. Mobile Security is a cloud-based service that brings comprehensive and flexible protection against web threats

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Admin Guide for Web Security Service

Admin Guide for Web Security Service Admin Guide for Web Security Service Copyright Web Security Service Admin Guide July, 2013; version 4.4 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

GFI WebMonitor 2011. Administration and Configuration Manual

GFI WebMonitor 2011. Administration and Configuration Manual GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as

More information

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 Larissa Berger Miriam Fitzgerald April 24, 2015 Abstract: This white paper guides customers through the new features

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012

User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012 User Guide Hosted Web Security Copyright CensorNet Limited, 2007-2012 This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

ADMINISTRATOR GUIDE VERSION

ADMINISTRATOR GUIDE VERSION ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

How Web Security Improves Productivity and Compliance

How Web Security Improves Productivity and Compliance How Web Security Improves Productivity and Compliance Why business managers, HR, legal, compliance and IT all like content filtering and web policy controls Contents Introduction: Web Security Is Not Just

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

RMFT Web Client User Guide

RMFT Web Client User Guide RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,

More information

AN INTRODUCTION TO QUICKBOOKS ONLINE. Getting Started Guide

AN INTRODUCTION TO QUICKBOOKS ONLINE. Getting Started Guide AN INTRODUCTION TO QUICKBOOKS ONLINE Getting Started Guide Copyright Copyright 2014 Intuit Ltd. All rights reserved. Intuit Australia Intuit Australia is a company registered in Australia - ABN 28 163

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware DATA SHEET ZSCALER WEB SECURITY CLOUD FOR SMALL BUSINESS OVERVIEW In today s competitive world, Small and Medium Businesses (SMB) are focusing their discretionary resources on growing revenue and increasing

More information

Getting Started Guide

Getting Started Guide Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional

More information

HP PROTECTTOOLS EMAIL RELEASE MANAGER

HP PROTECTTOOLS EMAIL RELEASE MANAGER HP PROTECTTOOLS EMAIL RELEASE MANAGER Business white paper HP ProtectTools Email Release Manager provides enhancements to the Microsoft Exchange and Outlook clients. HP has developed HP ProtectTools Email

More information

the barricademx end user interface documentation for barricademx users

the barricademx end user interface documentation for barricademx users the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Web DLP Quick Start. To get started with your Web DLP policy

Web DLP Quick Start. To get started with your Web DLP policy 1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it

More information

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs... Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Deploying F5 to Replace Microsoft TMG or ISA Server

Deploying F5 to Replace Microsoft TMG or ISA Server Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Secure Web Gateway 11.5 Release Notes

Secure Web Gateway 11.5 Release Notes Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...

More information

Gain the virtualisation advantage with Clearswift

Gain the virtualisation advantage with Clearswift Gain the virtualisation advantage with Clearswift The advantage of virtual Clearswift is at the forefront of virtualisation technology, with thousands of organisations around the world benefiting from

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Hosted Email Security Quick Start Guide

Hosted Email Security Quick Start Guide Hosted Email Security Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire 6.1 Administrator s Guide WildFire Cloud File Analysis Palo Alto Networks WildFire Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

Hosted Email Security 2.0 Quick Start Guide

Hosted Email Security 2.0 Quick Start Guide Hosted Email Security 2.0 Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

The enemy within: Stop students from bypassing your defenses

The enemy within: Stop students from bypassing your defenses The enemy within: Stop students from bypassing your defenses Computer literate K-12 students regularly use anonymizing proxies to bypass their school s web filters to access pornography, social networking,

More information

Verizon Family Protection Powered by McAfee. User Guide

Verizon Family Protection Powered by McAfee. User Guide Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information