The Many Motives for Content Based Filtering

Companies that implement content based filtering solutions do so for a wide variety of motives. The most common motive is to protect networks from web-borne threats such as malware and ransomware, while many companies are also keen to implement content based filtering solutions in order to protect their business and network users from phishing and identity theft.

Thereafter, the motives for implementing content based filtering solutions become more diverse. Some companies use their filtering solutions to enhance productivity in the workplace, others want to monitor their employee´s access to the Internet for compliance or legal reasons, while some businesses benefit commercially from implementing a solution for filtering Internet content.

In order for these motives to be achievable, a content based filtering solution has to be versatile and easy to use. If the solution lacks granularity or is too complicated to configure, the possibility exists that access to business-critical websites and applications will be blocked or that gateways will be left open for cybercriminals to deploy malware and execute phishing attacks.

How Content Based Filtering Solutions Work

Content based filtering solutions have two roles – to protect networks from web-borne threats and enforce compliance with acceptable use policies. Companies have minimal influence over the first role, as the mechanisms to prevent network users visiting websites known to harbor malware or likely to be fake phishing sites are installed by default and updated in real time by a service provider.

How acceptable use policies are enforced, however, is at the discretion of the system administrator appointed to manage the solution. The administrator can use category filters, keyword filters and whitelists to block or allow access to different types of websites and applications, and apply user policies universally or by individual user, user group, time, bandwidth or IP address.

Then, when a network user types a URL into a browser address bar – or clicks on a link to a website – the solution checks the request against its anti-malware mechanisms and against the filtering parameters applied to that user in order to determine whether to allow access to the requested website or not. The process is practically instant, and has positive outcomes in every user case.

Productivity, Compliance and Commercial Benefits

It has been calculated that a company with 100 employees will lose $3.5 million in productivity per year if each employee spends one hour each day on non-work related online activities. By blocking access to social media portals, pornography websites and online shopping – the three online activities most commonly attributed to “cyber-slacking” – companies can avoid this loss.

Online security and compliance go hand-in-hand for companies in regulated industries and, by implementing a content based filtering solution, companies can enhance their online security posture and – via the solution´s reporting features – identify risks that could compromise the integrity of data stored on their networks or transmitted between users.

Although enhanced productivity and the avoidance of fines security breaches could both be considered commercial benefits, companies in the hospitality industry will find that – by being able to provide a filtered Internet service – they can create a more family-friendly environment and attract clients who would rather not be exposed to inappropriate content being viewed on unfiltered Internet services.

Content Based Filtering Solutions from SpamTitan

We have been developing online security solutions since 1999 and, based on feedback from our many clients, we have developed “WebTitan” content based filtering solutions that offer maximum protection against web-borne threats, a high degree of granularity and purposeful ease of use. Some of the features you will find in our solutions include:

  • For protecting networks – and the users who connect to them – against web-borne threats, WebTitan solutions use a combination of blacklists, SUBRL filters, phishing protection software, malicious URL detection software and antivirus software.
  • In order to provide a high degree of granularity, more than six billion web pages are sorted into fifty-three categories (abortion, adult entertainment, alternative beliefs, alcohol, etc.) that system managers can block access to with the click of a mouse.
  • The application and enforcement of user policies is conducted via a centralized web portal that can be accessed from any Internet-connected device. The solutions can be integrated with management tools such as Active Directory for faster policy creation.

Our content based filtering solutions also come with a choice of deployment options. WebTitan Gateway is a virtual software appliance that is installed behind a company´s firewall. WebTitan Cloud is a DNS-based solution that is universally compatible with all operating systems, and WebTitan Cloud for WiFi is a suitable solution for companies providing a WiFi service or operating a BYOD policy.

Try Content Based Filtering for Free

Regardless of your motives for implementing a content based filtering solution, we invite you to take a free trial of a WebTitan solution in order to evaluate its effectiveness, versatility and ease of use in your own environment. Our trial gives you the opportunity to find the optimum settings for your specific circumstances so that, if you subsequently decide to continue using our service after your free trial, no further configuration will be necessary.

To find out more about this opportunity, do not hesitate to contact us. Our team of Sales Technicians will discuss your current online security defenses and your motive for filtering Internet content in order to determine the best content based filtering solution for you to try. They will then guide you through the registration process to start your trial and be on hand throughout to help you best protect you network from malware, ransomware and phishing, while enforcing your acceptable use policies.

Logos