User's voice NET NANNY. Quite simple to install and configure. Improve messages and possible reactions when a page is blocked. Comprehensibility:



Similar documents
Windows XP (32/64 bit) Windows 7 (32/64 bit) Vista (32/64 bit) Mac OS X (from 10.4 version on) 12 years old users: 15/21 (points 1,59 out of 4)

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

User's voice. Safe Eyes. User 1: I was surprised how the tool was easy to install and configure. Comprehensibility:

User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes

CYBERSITTER NAME. LLC/Solid Oak Software. Company. Version Client. Type of product. Computer. Devices supported

MOBICIP NAME. Mobicip. Company. Version Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows)

Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.

User's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes

ENOLOGIC NETFILTER HOME

F-SECURE INTERNET SECURITY 2012

Puresight Technologies Ltd. Arabic, Dutch, English, German, Greece, Russian. 12 years old users: 1/21 (points 2,67 out of 4)

Trend Micro Incorporated. Windows 7 (Unspecified. Tested on 64 bit) Windows Vista (Unspecified. Tested on 64 bit) Windows XP (32/64 bit)

INTRODUCTION 4 Objectives 4 What are the parental control tools? 5 What are the main criteria for choosing a tool and type of test carried out?

Safe internet for business use: Getting Started Guide

Safe internet: Getting Started Guide

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

Release 2.0. Cox Business Online Backup Quick Start Guide

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

SecuraLive ULTIMATE SECURITY

Cisco WebEx What s new in WebEx Business Suite 28?

OPTENET Security Suite / OPTENET PC Web Filter

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

FortKnox Personal Firewall

AW-HE60 Firmware Upgrade Procedure

WD Sentinel DX4000. Small Office Storage Server. Administrator s Quick Install Guide

Benchmarking of parental control tools for the online protection of children SIP-Bench II Assessment results and methodology 4 th Cycle

Configuring Your Gateman Proxy Server

Lindenbaum Web Conference

Unified Meeting 5 User guide for MAC

MERLIN SERVER. The Quick Start Guide for collaborative project management ProjectWizards GmbH, Melle, Germany. All rights reserved.

OpenScape Web Collaboration

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

Version 6.7 OPERATOR S GUIDE

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface

Wireless Presentation System User s Manual

The instructions in this user guide will help make meetings easier to manage, more effective and more productive.

ADOBE FLASH PLAYER Local Settings Manager

Mobile Configuration Profiles for ios Devices Technical Note

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

Release Notes for Websense Security v7.2

Vectorworks 2015 Site Protection Server User s Guide

Chapter 6 Using Network Monitoring Tools

WD Sentinel DX4000. Small Office Storage Server Administrator s Quick Install Guide

TECHNICAL REFERENCE. Version 1.0 August 2013

1. Chat4Support Introduction

Parental Control Single Product Test

Configure Web Conference Parameters Through The Web Conference Administration User Interface.

Online Backup Client User Manual

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Getting Started with VMware Horizon View (Remote Desktop Access)

Configuration Manual English version

OpenScape Web Collaboration

Cisco WebEx Meetings Server

Unified Meeting 5 User guide for Windows

Desktop Surveillance Help

Proxies. Chapter 4. Network & Security Gildas Avoine

BROWSER AND SYSTEM REQUIREMENTS

NAS SERVER FOR EXTERNAL HDD

McAfee Family Protection

Chapter 6 Using Network Monitoring Tools

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

NF1Adv VOIP Setup Guide (for Pennytel)

The current case DNSChanger what computer users can do now

Online Backup Client User Manual

Troubleshooting Guide

Ekran System Help File

How To Check If Your Router Is Working Properly

Thinspace deskcloud. Quick Start Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Kaspersky Security Center Web-Console

FortiClient SSL VPN Client User s Guide

Kaseya 2. User Guide. for VSA 6.3

Evaluation Guide. iprism Web Security V7.000

Home Internet Filter User Guide

Spontania User Setup Guide

Smart Telephone System

User's Manual. Intego Remote Management Console User's Manual Page 1

Name of Filtering Software

IceWarp to IceWarp Server Migration

Internet Filtering Appliance. User s Guide VERSION 1.2

SSL Enforcer Documentation

Cloudfinder for Office 365 User Guide. November 2013

PREFACE iss.01 -

QuarkCopyDesk 9.1 ReadMe

User's Guide. Copyright 2012 Bitdefender

Burst Technology. bt-webfilter User Guide

NF1Adv VOIP Setup Guide (for Generic VoIP Setup)

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)

User Guide. for Windows ContentWatch Inc. All rights reserved S. High Tech Drive, Midvale, UT 84047

Internet for Everyone In-Room Instructions January 2011 Version 1.3

Cloud Services MDM. ios User Guide

How To Set Up A Xerox Econcierge Powered By Xerx Account

Transcription:

NAME NET NANNY Company Content Watch Version 6.5.13.1 Type of product Devices supported Operating systems Client Computer Microsoft Windows 7 (32/64 bit) Microsoft Windows Vista (32/64 bit) Microsoft Windows, XP (32 bit) Mac OS X 10.4 or higher (Tiger, Leopard, Snow Leopard and Lion) Price* 1 license: 30 3 licenses: 45 Language of interface English Spanish 12 years old users: 5/21 (points 2,05 out of 4) GLOBAL RANKING** 13 years old users: 4/21 (points 2,22 out of 4) *Prices might change according to the latest company offers User's voice Comprehensibility: Look and Feel: Time to install and configure: Quite simple to install and configure. Improve messages and possible reactions when a page is blocked. Test users placed in: France Test user s degree of Internet literacy: 43 minutes 2 test users

FUNCTIONALITY The web filtering customization provides the parent with different options with respect to the content topics: BLOCK, ALLOW, WARNING. There is also the profanity category that the parent can choose to MASK: this will replace profane words with symbols. The parent can create a list of unsafe keywords. The parent can indicate specific URLs to be blocked (creation of a black list) or allowed (creation of a white list) by the filter despite the selected categories to be blocked/allowed. In case of more than one profile the URLs exception applies to all profiles and in case the parent wishes to have different settings for this aspect, he/she should switch to the specific profiles settings and modify them. The users can also be enabled to send request for exceptions referred to filtering activities. Skype and Streaming application (Windows Media player) cannot be blocked. The reporting dashboard is very user-friendly and appealing and provides the Admin with data analyzed from different perspectives. It is possible to block Social Networking and to monitor the profile s updates. FUNCTIONALITY SCORE: 2,7 OUT OF 4 POINTS EFFECTIVENESS The overall effectiveness score is good for adult content and very weak for other harmful content. The tool performs better on web than web 2.0. There is no major difference in effectiveness between teenagers and children. There is no major difference in effectiveness among the different languages. Effectiveness score with adult content filtering for 12 years old user: 3,0 Effectiveness score with other harmful content filtering for 12 years old user: 0,0 Effectiveness score with adult content filtering for 13 years old user: 3,0 Effectiveness score with other harmful content filtering for 13 years old user: 0,0 OVERALL SCORE FOR EFFECTIVENESS FOR 12 YEARS OLD USER: 1,5 OUT OF 4 POINTS OVERALL SCORE FOR EFFECTIVENESS FOR 13 YEARS OLD USER: 1,5 OUT OF 4 POINTS

USABILITY Installation of the tool: The installation process is generally comprehensible, but explanations or support are missing at some points. The installer does not provide advanced options and cannot be influenced with regard to kind or amount of information, except for the language. The process is mostly consistent, but behaves partly unexpectedly concerning the order of steps. Configuration of the tool: The configuration process is partly incomprehensible and context sensitive explanations are often missing, e.g. remote configuration via web is provided but hard to find. The process contains several inconsistencies and it does not always meet users' expectations. There are some options to individualise or influence the process. The design could be improved to match the common standard. Usage of the tool: When a web site has been blocked, the tool offers an option to send an allowance request to the admin. The alert message can be replaced by another website, but the default message is not worded with respect to children's capability of understanding. The reporting is mostly comprehensible. Usability of the installation process: 2,41 Usability of the configuration process: 2,48 Usability of the usage of the product: 2,44 OVERALL SCORE FOR USABILITY: 2.46 OUT OF 4 POINTS SECURITY The tool resisted to the main hacking attacks to by-pass it, The test for changing the P2P application port was signed as N/A since the tool does not prevent from using the blacklisted application. OVERALL SCORE FOR SECURITY: 4 OUT OF 4 POINTS

DETAILED FUNCTIONALITY FICHE AREA OF NEED FUNCTIONALITY SPECIFIC ISSUE ASSESSMENT MGMNT FILTERING CUSTOMIZATION Management of users profile Monitoring Topics Urls White lists Create several profiles Remote access Customisation of filtering topics Restrict browsing to a white list Default white list Modification OR Creation Modification Creation Urls Black lists Creation of user s own black list Default black list KEYWORDS Keywords Default white list Creation of a user s black list Creation of a user s white list TIME BLOCKING MESSAGE Time limit settings Type Set a specific timeframe or web access duration Ask for unblocking to parents Redirect to safe resources Web Block access Monitor access Safe Search Availability Social Networks Block access Monitor usage Personal data provision Block Block the access Application - USAGE RESTRICTION Streaming P2P application Monitor the access to the application Block the application Monitor downloads Web - Block (chat, VoIP, Video-chat) Skype application Monitor the access Prevent from new contact Block the application Windows Live Messenger Monitor the access Prevent from new contact e-mail Block email Client and/or web (web based)

DETAILED SECURITY FINDINGS The Tool prevents the user from by-passing the filter by: / Using the IP address instead of the URL Using an alternative browser Changing time and date settings* Disabling or uninstalling the software without a password* Closing the filtering tool trough the Task Manager Using a proxy instead of a direct connection to the Internet Accessing the web-pages through the Google Cache Reaching a website through translation sites Renaming a blocked application Using Safe Mode Changing the port of Peer-to-Peer application N/A *As managed directly by the tool and not by the device. DETAILED USABILITY FINDINGS / I: installation in 3 steps or less I: choice of installation for beginners or advanced users C: different degrees of strength for the filtering C: different content criteria for the filtering C: option to transfer filter configurations between target users C: option to transfer filter configurations between devices C: altogether comprehensible configuration C: altogether in conformity with user expectations C: altogether easy to learn U: alert message in a child friendly language U: option to customise the reaction in case of blocking U: altogether easily operable and comprehensible reporting