Follow us on Twitter...
Stay up to date with the latest news, special offers and advice from CensorNet on Twitter... we are Tweeting regularly!
Access downloads, trial keys, docs and resources.
The Content Classifier rates and categorises Internet content into appropriate and inappropriate categories using a range of tools, techniques and methods to produce maximum accuracy in minimum time.
The URL database is a human verified list of hundreds of millions of web sites classified in over 140 categories and in multiple languages. The URL database server is updated on a daily basis and provides extremely fast verification of known Web sites. Policies can be created to "allow" or "deny" different categories, for different users and devices.
The proxy server can control HTTPS/SSL sites without requiring a certificate to be installed in the client browser. This light-touch mode is perfect for fast deployment. For deeper inspection, the SSL Intercept feature can be enabled which allows the proxy server to decode encrypted (SSL) web sites by intercepting the transmission between the client browser and the remote web server.
The proxy server is designed to detect zero-hour (or unclassified) anonymous proxy sites, or sites containing links to anonymisers. Combined with the database of known sites, which are updated daily, this provides a powerful and accurate defense against anonymous proxies.
Filters embedded URL's to protect against proxy avoidance e.g. using translators and cache services such as Google cache.
The image filtering module attempts to rate image content (JPEG/JPG, BMP, GIF, TIF, TGA, WMF, PNG, MNG, PGX, PNM, RAS) in real time as the content passes through the proxy. The module adopts many complex techniques, such as edge detection, colour tones, curvature and body size algorithms to produce a probability rating as to whether the image is pornographic.
The Custom URL Module allows the administrator to create and manage groups of Web sites that are trusted or always denied. The categories from the Custom URL module that are active within a policy will always take precedence over any other filtering rules. This provides the administrator with the necessary control to maintain a subjective list of trusted and blocked sites.
The File Extension module allows the administrator to specify a list of file extensions to block.
The MIME-Type module allows the administrator to specify a list of content types to block.
The Safe Search module forces anyone visiting Google, Yahoo!, Bing or YouTube to have "Safe Search" enforced regardless of whether the user disables it in their account profile. This can be applied on a per policy basis.
The YouTube for Schools feature converts YouTube into a safe education resource for video content. This can be applied on a per policy basis. A YouTube for Schools account is required.
Automatically redirect requests to a particular domain somewhere else. For example, if your organisation wants to standardise on one particular Search Engine, you can redirect requests to other search engines to your preferred one.
Apply advanced regular expression matching to URL's, which allows for accurate keyword filtering on search engines.
Allow web applications and sites that do not support proxying to pass through. Sites can be bypassed for authentication, SSL inspection or both.
The Policy Manager allows you to easily manage filtering policies for your users and devices. A policy consists of a set of rules and the rules correspond to the Content Filtering modules; Redirect, Custom URL, URL RegEx, Custom URL, Categories, Safe Search, Files, MIME Types, Images. You can create any number of rule combinations and policies.
The Unfiltered Policy mode allows completely unfiltered Internet access to the specified user, device or group. Access will still be logged.
The Blocked Policy mode blocks all Internet access for the specified user, device or group.
The Restricted Policy limits the specified user, device or group to an administrator defined list of trusted Web sites.
The Filtered Policy allows the administrator to define which Content Filtering modules, and their respective filtering options, are active for a specific user, device or group.
Same as Filtered Policy except the user may override any blocked requests.
The Policy Scheduler allows the administrator to quickly and easily assign policies to users, devices or groups which are active at different times of the day or week.
Synchronise CensorNet with Active Directory by OU or Primary Group. CensorNet will automatically replicate the AD structure and any changes made to it. Easy!
Set a daily time quota for accessing specific categories of Web sites (e.g. Travel, Shopping, Social Networking). When the time quota is used up, the web sites are blocked until the following day
The User Manager allows the administrator to quickly add, remove or update users known to the CensorNet Pro proxy. Users can be imported from a variety of authentication sources, including Microsoft Active Directory, LDAP and CSV. Any unrecognised users attempting to use the proxy will simply be filtered using the Default Policy.
The Device Manager allows the administrator to quickly add, remove or update device objects known to the CensorNet Pro proxy. Devices can be imported automatically using the "Probe LAN" tool or from a CSV file format. Any unrecognised devices attempting to use the CensorNet proxy will simply be filtered using the Default Policy.
The Suspend User option allows the administrator to prevent a user from accessing the Internet temporarily.
The Request Unblock feature allows your users to request that a page is unblocked if they feel it has been incorrectly blocked by the proxy. Users can specify a reason and request an email when their request has been actioned.
Import users and devices from a variety of sources using our easy to use import wizards.
The Analyse Report will show the exact pages and objects were visited by a particular user or device between a specific date/time range and matching the specified criteria. The results can be expanded to show each individual URL visited and whether the request was allowed/denied and its classification.
The Report Builder allows the administrator to build customised reports based on the information collected by the proxy server. Any number of reports can be created based on different conditions, for example time/date, username, workstation, URL, filter module, violation and so forth. Report results can be exported.
Report on bandwidth usage by user, device, category and domain.
The Chart Reports generate an easy to view graph and data snapshot based on a pre-defined set of templates. The chart and its data can be exported.
The Activity Report shows an instant snapshot of the users and devices accessing the Internet through the proxy.
Export selected report results and snapshots to Adobe PDF, Excel or CSV format.
On very busy networks proxy can quickly collect gigabytes of information. The Archive Manager allows the administrator to move old data to an archive to improve performance. Archives can also be included in the reports created using the Report Builder.
The CensorNet system is administered through an easy-to-use and responsive Web-based Control Panel, accessible using a modern Web browser (such as Internet Explorer, Google Chrome or Mozilla Firefox).
The CensorNet Proxy server can operate with or without User Authentication. CensorNet supports Microsoft Active Directory, LDAP and internal authentication sources. With User Authentication turned on, users will be required to log-in before accessing the Web unless single sign on is enabled.
Quickly and easily replicate your Active Directory OU groups within CensorNet Professional and apply filtering policies.
The CensorNet Pro proxy server supports "negotiate kerberos" authentication for use with Microsoft Windows domains.
The Captive Portal allows BYOD devices to authenticate with the proxy server using a valid username and password without the administrator having to configure anything on the device. The Captive Portal can also be accessed based on device address rather than user.
The Deployment option allows the administrator to review deployment settings and the proxy server automatically generates a valid WPAD proxy.pac file for the network.
The CensorNet Pro proxy server can authenticate devices based on Hostname, IP address or MAC address. Devices can be added to a group with authentication disabled - ideal for guest environments.
Create multiple administrator users and delegate access to different areas of the system. e.g. an admin user that can only access Reports or only manage Unblock Requests.
The administrator can specify a parent proxy or parent cache, which will force the proxy server to pass requests upstream.
The administrator can Backup and Restore the CensorNet Pro system easily using the tools provided.
Diagnose connection issues with the inbuilt packet tracer and analyse the output using Wireshark.