Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end [...]
Today, I had the pleasure of attending Western Australian Internet Association’s first (out of four) breakfast events. The main topic on the agenda was E-Security and a panel of expert, representing commercial, government and educational bodies, were there to shed a light on the latest developments. […]
Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]
A great feature of Vantage Ultimate is its ability to publish reports and storages to the Web Module so that users can login, view their reports, and analyze data. But no one wants to have to remember yet another username and password combination to login to the Web Module, so make it easy on your users by using Windows Authentication. This way, as long as a user is logged into their Windows machine with their Windows domain username, they will sail straight into the Web Module without being prompted for a username or password.
The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend [...]