Follow us on Twitter...
Stay up to date with the latest news, special offers and advice from CensorNet on Twitter... we are Tweeting regularly!
Access downloads, trial keys, docs and resources.
If you have multiple branch offices and you require policy management from a central location you can configure one CensorNet server to be the master and have the policy data replicated to the remote CensorNet servers for ease of management.
The Category Server database is a human verified list of over 130,000,000 Web sites categorised in over 120 categories and in multiple languages. The Category Server is updated on a daily basis and provides extremely fast verification of known Web sites. Policies can be created to "allow" or "deny" different categories, for different users and machines.
The Content Classifier module consists of a collection of advanced content rating and lexical analysis techniques used to understand the context of Web pages in real-time and in multiple languages. The Content Classifier rates and categorises Internet content into appropriate and inappropriate categories using a range of tools, techniques and methods to produce maximum accuracy in minimum time.
The HTTPS Intercept mode allows CensorNet to filter encrypted (SSL) web content by intercepting the transmission between the client browser and the remote web server. This powerful feature ensures that CensorNet can protect against previously hidden and anonymous threats.
The Anonymous Proxy real-time rater is designed to detect zero-hour (or unclassified) anonymous proxy sites, or sites containing links to anonymisers. Combined with the database of known sites, which are updated daily, this provides a powerful and accurate defense against anonymous proxies.
Filters embedded URL's to protect against proxy avoidance e.g. using translators and cache services such as Google cache.
The Active Image Control module attempts to rate image content (JPEG/JPG, BMP, GIF, TIF, TGA, WMF, PNG, MNG, PGX, PNM, RAS) in â€˜real timeâ€™ as the content passes through the proxy. The module adopts many complex techniques, such as edge detection, colour tones, curvature and body size algorithms to produce a probability rating as to whether the image is pornographic.
The Custom URL Module allows the administrator to create and manage groups of Web sites that are trusted or always denied. The categories from the Custom URL module that are active within a policy will always take precedence over any other filtering rules. This provides the administrator with the necessary control to maintain a subjective list of trusted and blocked sites.
Prevent uploading of confidential documents to online storage or free webmail sites.
The File Extension module allows the administrator to specify a list of file extensions to block.
The MIME-Type module allows the administrator to specify a list of content types to block.
The Safe Search module forces anyone visiting Google, Yahoo!, Bing or YouTube to have "Safe Search" enforced regardless of whether the user disables it in their account profile.
The Policy Manager allows you to easily manage filtering policies for your users and workstations. A policy consists of a set of rules and the rules correspond to the Content Filtering modules described. You can create any number of rule combinations and policies.
The Open Policy mode allows completely unfiltered Internet access to the specified user, workstation or group.
The Closed Policy mode blocks all Internet access for the specified user, workstation or group.
The Restricted Policy limits the specified user, workstation or group to an administrator defined list of trusted Web sites.
The Filtered Policy allows the administrator to define which Content Filtering modules, and their respective filtering options, are active for a specific user, workstation or group.
Same as Filtered Policy except the user may Override any blocked requests.
The Policy Scheduler allows the administrator to quickly and easily assign policies to users, workstations or groups which are active at different times of the day or week.
Synchronise CensorNet with Active Directory by OU or Primary Group. CensorNet will automatically replicate the AD structure and any changes made to it. Easy!
Set a daily time quota for accessing specific categories of Web sites (e.g. Travel, Shopping, Social Networking). When the time quota is used up, the web sites are blocked until the following day
The User Manager allows the administrator to quickly add, remove or update user objects to the CensorNet system. Users can be imported from 6 authentication sources, including Microsoft Active Directory, Novell e-Directory and SAMBA. Any unrecognised users attempting to use the CensorNet proxy will simply be filtered using the Default Policy.
The Bandwidth Limiting feature allows you to allocate a slice of bandwidth evenly for all users in a particular group.
The User Manager allows the administrator to quickly add, remove or update workstation objects to the CensorNet system. Workstations can be imported automatically using the "Probe LAN" tool or from a CSV file format. Any unrecognised workstations attempting to use the CensorNet proxy will simply be filtered using the Default Policy.
The Suspend User option allows the administrator to prevent a user from accessing the Internet temporarily.
The Request Unblock feature allows your users to request that a page is unblocked if they feel it has been incorrectly blocked by CensorNet. A digest of unblock requests can be sent to the administrator by e-mail for review. Users can specify a reason and request an email when their request has been actioned.
Import users and workstations from Active Directory using our easy to use import wizards.
The Visits report will show the exact pages and objects visited by a particular user or machine between a specific date/time range. The results can be expanded to show each individual URL visited and whether the request was allowed/denied and its classification.
The Report Builder allows the administrator to build customised reports based on the information collected by CensorNet. Any number of reports can be created based on different conditions, for example time/date, username, workstation, URL, filter module, violation and so forth.
Report on bandwidth usage by user, machine, category and domain.
The Top 20 Reports provide a snapshot of useful information for the administrator, for example the Top 20 violating users/workstation, Top 20 most accessed sites and so forth.
The Top Tables Reports provide a 30 day overview of the most popular Web sites, most active users/workstations, most violating users/workstations providing the administrator with a birds eye view of their Internet usage.
The Who's Browsing report shows an instant snapshot of the users and workstations accessing the Internet through the CensorNet proxy.
Export report results and snapshots to Adobe PDF or CSV format.
Access the CensorNet database via ODBC and use the power of Crystal Reports to generate custom reports and mine data held by CensorNet. Free ODBC driver available.
On very busy networks CensorNet can quickly collect gigabytes of information. The Archive Manager allows the administrator to move old data to an archive to improve performance. Archives can also be included in the reports created using the Report Builder.
The CensorNet system is administered through an easy-to-use Web-based Control Panel, accessible using a standard Web browser (such as Internet Explorer or Mozilla Firefox/Netscape).
The CensorNet Proxy server can operate with or without User Authentication. CensorNet supports Microsoft Windows NT, Microsoft Active Directory, Novell e-Directory, LDAP, SAMBA and internal authentication sources. With User Authentication turned on, users will be required to log-in before accessing the Web.
Quickly and easily replicate your Active Directory OU groups within CensorNet and apply filtering policies.
The CensorNet Proxy server supports NTLM allowing for transparent User Authentication on Microsoft Windows and SAMBA networks.
The CensorNet Proxy server can authenticate workstations based on IP address or MAC (physical) address.
The administrator can specify the size of the on-disk Web cache, which is used to improve the performance of the proxy server.
The administrator can specify a parent proxy or parent cache, which will force CensorNet to pass requests upstream.
The administrator can Backup and Restore the CensorNet system easily using the tools provided.
Diagnose connection issues with the inbuilt packet tracer and analyse the output using Wireshark.