How to ensure that employees' online behavior is reasonable?
How to restrict employees from abusing enterprise's network resources?
How to reasonably allocate and utilize the Internet bandwidth of enterprises?
> how to prevent employees from revealing confidential information of enterprises through email or network?
How to prevent outsiders from attacking the company's internal network?
Basic functions:
1. real-time monitoring:
Monitor the current network usage in real time, and check the information of users accessing the Internet, including access protocol, IP address, access content, data flow, access time, etc.
2. Access control:
Based on the control mode of group policy, employees, working groups or departments and the whole enterprise can be flexibly controlled to access Internet services on specified dates and time periods, such as:
Online games and shopping websites are forbidden during working hours, QQ is forbidden, and MSN Messenger is allowed.
You are allowed to send and receive emails, visit web pages and chat online after work hours.
The cumulative total time of surfing the Internet during working hours every day shall not exceed 2 hours.
Manager-level employees use the network access policy of "Senior Manager"
3. Audit query:
Multi-standard combination query is convenient for enterprises to query and review the historical access records of employees, and can query the Internet access of all users or designated users within a specified time range. You can also query the history of users' access to the network by time or IP address;
4. Statistical analysis:
According to employees or departments, you can make statistics on the Internet within a specified time, including traffic and connection time. You can also count the email system usage, website browsing time and MSN usage time of an employee or department within a specified time. Can provide department leaders with a report on the online situation of their subordinates within a week. The online behavior of all employees or an employee can be analyzed in the form of charts, including daily online analysis, most frequently visited web analysis, most frequently visited people, data flow and access time. To help network managers understand the distribution of enterprise network use. Users can also directly export all kinds of statistical data to Excel tables, which is convenient for secondary chart processing.
5. Content monitoring:
By setting rules, we can monitor the data content transmitted on the Internet, including the sending and receiving of e-mail, BBS posting, files uploaded through the Web, MSN and Yahoo! And ICQ. The system automatically records and classifies the monitoring contents according to the conditions, and can automatically send emails to inform relevant personnel when sensitive information appears.
6. User Settings:
Support user management mode based on IP address or network card MAC address. Internet access can be managed by machine or user authentication. The former is suitable for the environment where everyone uses fixed machines, and the latter is suitable for the situation where many people share a machine or everyone's machines are not fixed. It can be set in batches by IP address segmentation, which is suitable for enterprises to configure some dynamic IP, some fixed IP addresses or some user authentication to surf the Internet. The management or special departments of the company can be set as users without monitoring, and all their network behaviors will no longer be managed and recorded by the system.
7. Automatic classification and backup:
The system will automatically sort out all kinds of data and delete unnecessary data according to the different storage time set by users, thus ensuring the long-term operation of the system. At the same time, the system automatically backs up the monitoring data locally or remotely, and the backed-up information can be viewed offline with the browser.
Additional module
1. Mail interception audit:
Webmaster is unique in China. It intercepts and reviews outgoing emails through preset rules, including sender, subject, attachment name, etc. , to prevent employees from revealing key information of the enterprise through e-mail. Auditors can read the full text and attachments of the intercepted mail, and then make decisions such as sending, forwarding or rejecting. All this is transparent to the sender.
2. Third-party synchronous authentication:
For enterprises that use user account management to manage employees' online behavior, the network supervisor provides a domain synchronization authentication module based on Windows2000/NT. After installing the network inspector domain authentication synchronization software on the domain server, the user does not need to enter the user name and password again when authenticating.
3. Management Center:
Through the Internet, multiple network inspectors can be managed in a unified way. In the management center, you can set monitoring conditions, monitor the online situation of all units under it in real time, and receive the log information of all units. Set the control strategy and automatically distribute it to the designated units.
4. Internet billing:
Charge individuals and departments for time or data traffic when accessing the Internet. Provide a variety of billing modes, support unlimited monthly, limited monthly and full billing. The system supports card users, has the functions of issuing cards and storing values, and can automatically generate account names and passwords. When users surf the Internet, the system will automatically deduct the cost of the corresponding card account.
5. Bandwidth management:
Ensure that enterprises are not affected by others' access to the Internet when using key application services such as ERP, video conferencing and VoIP. Bandwidth can be divided into several virtual channels, and the bandwidth, upload and download speed limit, priority and management strategy of each channel can be set. Bandwidth usage policies can be specified by departments or individuals, services or people visiting an address.
6. Intranet monitoring:
This is a monitoring engine that needs to install client software, which can cooperate with network inspectors to realize the comprehensive management of client machines, including remote control, software asset management and application control.
Shenglei Channel Manager
Mobile phone: 1376 1680803
Shanghai xinwangcheng information technology co., ltd
Shanghai pro network information technology co., ltd.
Address: Floor 27 1 Tiandi Software Park, No.879 Zhongjiang Road, Shanghai (200333)
Direct telephone: 86-2 1-5 1556023
Operator: 86-2 1-5 1556000.
Fax: 86-2 1-5 1556030
E-mail:shenglei@pronetway.com
MSN:sheng.lei@hotmail.com
www.pronetway.com
Our customers:
Wuxi Sony, Shanghai Baosteel, Beijing Olympic Headquarters, Beijing Hyundai Motor, Shanghai Hitachi, Guangzhou Panasonic Wanbao, Giant, xinhua Control, National Tourism Administration, Shanghai Information Commission, Wuxi Commercial Bank, Xi Jiaotong University, Guomai Unicom, Guangzhou Meiya, Xizhilang Group, Hangzhou Yamaha, Ningbo Shuaikang, Dong 'e Ejiao, Fujian Provincial Public Security Department, Xiamen Education Bureau, Anhui Electric Power Bureau, SAIC Group.