Internet Access Control

If you provide employees, students, guest users, or members of the public with access to the web, there are a number of good reasons why you may wish to implement an Internet access control solution. By controlling who can access the Internet, when they can access it, and what content they can access, you can prevent such issues as:

  • Employees engaging in non-work related activities.
  • Students being exposed to harmful online material.
  • Illegal activity by guest users (for which you may be liable).
  • Members of the public openly viewing inappropriate content.

All of the above are valid reasons for implementing an Internet access control solution. However, solutions for controlling Internet access also serve a further, vital purpose – the prevention of access to websites containing malware and ransomware.

The cost of recovering from a malware or ransomware infection is substantial. It can force the closure of small businesses and damage the credibility of larger organizations. Malware can prevent schools from functioning and harm individuals who are victims of phishing or identity theft.

Compared to the consequences of a malware or ransomware infection, the cost of implementing solutions for controlling Internet access is minimal. Cloud-based solutions are particularly inexpensive and low maintenance. No software installations are required, the solutions typically self-configure, and Internet access control is managed from a web-based portal with a few clicks of a mouse.

How Cloud-Based Solutions for Controlling Internet Access Work

Cloud-based solutions for controlling Internet access are implemented by redirecting your server´s DNS settings to a service provider´s servers. Once connected to the Internet access control service, administrators can log into the web-based portal in order to set the filtering parameters as best suits the requirements of the business, school or organization.

One area over which administrators have no control is the first line of defense against malware and ransomware. This line of defense includes blacklists of websites known to harbor malware and ransomware, blacklists of IP addresses from which spam email is known to have originated, and malicious URL detection software, phishing protection software and antivirus software.

This first line of defense checks every request to visit a website against the blacklists and security software to ensure they are safe to visit. Both the blacklists and the software are updated in real time by the service provider, reducing the maintenance overhead of the Internet access control solution and ensuring both users and networks are protected from the very latest web-borne threats.

Setting the Filtering Parameters to Best Suit Your Requirements

Cloud-based solutions for controlling Internet access have multiple options to meet the requirements of every type of business, school or organization. It is unlikely that any system administrator will need to use all the options. They exist to provide maximum granularity, to ensure Internet access to important sites is not blocked, and so that no gaps are left in the network´s defenses for cybercriminals to exploit.

The easiest way to control internet access is by using category filters. There are 53 different categories (abortion, adult entertainment, alternative beliefs, alcohol, etc.), into which six billion web pages have been sorted according to the nature of their content. System administrators can control Internet access to any of these categories with the click of a mouse.

It is possible to fine tune the category selections with keyword filters – these present the opportunity to control access to websites with specific words in their content or in downloadable files. It is also possible to control Internet access by individual user, user group, time and bandwidth, or – if one network user requires access to a specific blocked website – adding the website to a whitelist so it bypasses the filtering parameters.

Most Commonly Blocked Website Categories
WorkplaceSchoolPublic WiFi
PornographyMature ContentPornography
PhishingHate SpeechShareware
Online GamblingViolenceViolence
Online ShoppingIllegal DrugsHate Speech
Video StreamingAlcoholSpyware

Try Our WebTitan Internet Access Control Solutions for Free

Setting the filtering parameters to best suit your requirements may sound complicated – especially if you are administering a network for a large organization. However, by integrating an Internet access control solution with management tools such as LDAP or Active Directory, the process can be accelerated significantly. Smaller organizations should be able to set their initial filtering parameters within minutes.

To demonstrate the ease of use and effectiveness of cloud-based solutions for controlling Internet access, we invite you to take advantage of a free trial of WebTitan Cloud or WebTitan Cloud for WiFi depending on whether you operate a fixed or wireless network. Both solutions for controlling Internet access are compatible with any operating system, scalable to tens of thousands of users, and have the versatility to meet the requirements of every type of business, school or organization.

To find out more about our offer, or to raise any questions about Internet access control, do not hesitate to contact us. Our team of helpful Sales Technicians will be happy to answer your questions, will guide you through the process of registering for your free trial, and will be on hand throughout your trial to help you find the optimal filtering parameters to best suit your requirements.

Logos