7 10, 2009

How to Improve Public Proxy Management and Control

By | 2009-10-07T04:28:28+00:00 October 7th, 2009|How To, Tips and Best Practices, Uncategorized|0 Comments

Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end [...]

29 09, 2009

How to Educate your Workforce and Strengthen Security with Internet Monitoring

By | 2009-09-29T08:03:38+00:00 September 29th, 2009|How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage|0 Comments

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]

2 09, 2009

Internet Monitoring Best Practices – 10 Valuable Tips

By | 2009-09-02T13:43:44+00:00 September 2nd, 2009|Tips and Best Practices, Uncategorized, WebSpy|0 Comments

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend [...]