Request Quote

Log in to evaluate

Access downloads, trial keys, docs and resources.

Web safety, monitoring and control

Product features

Policy Replication

If you have multiple branch offices and you require policy management from a central location you can configure one CensorNet server to be the master and have the policy data replicated to the remote CensorNet servers for ease of management.

Content Classifier

The Category Server database is a human verified list of over 130,000,000 Web sites categorised in over 120 categories and in multiple languages. The Category Server is updated on a daily basis and provides extremely fast verification of known Web sites. Policies can be created to "allow" or "deny" different categories, for different users and machines.

Real-time Rating

The Content Classifier module consists of a collection of advanced content rating and lexical analysis techniques used to understand the context of Web pages in real-time and in multiple languages. The Content Classifier rates and categorises Internet content into appropriate and inappropriate categories using a range of tools, techniques and methods to produce maximum accuracy in minimum time.

HTTPS (SSL Enabled) Intercept

The HTTPS Intercept mode allows CensorNet to filter encrypted (SSL) web content by intercepting the transmission between the client browser and the remote web server. This powerful feature ensures that CensorNet can protect against previously hidden and anonymous threats.

Anonymous Proxy Detection

The Anonymous Proxy real-time rater is designed to detect zero-hour (or unclassified) anonymous proxy sites, or sites containing links to anonymisers. Combined with the database of known sites, which are updated daily, this provides a powerful and accurate defense against anonymous proxies.

Embedded URL filtering

Filters embedded URL's to protect against proxy avoidance e.g. using translators and cache services such as Google cache.

Image Content Filtering

The optional image filtering module attempts to rate image content (JPEG/JPG, BMP, GIF, TIF, TGA, WMF, PNG, MNG, PGX, PNM, RAS) in real time as the content passes through the proxy. The module adopts many complex techniques, such as edge detection, colour tones, curvature and body size algorithms to produce a probability rating as to whether the image is pornographic.

Custom URL Module

The Custom URL Module allows the administrator to create and manage groups of Web sites that are trusted or always denied. The categories from the Custom URL module that are active within a policy will always take precedence over any other filtering rules. This provides the administrator with the necessary control to maintain a subjective list of trusted and blocked sites.

File Upload

Prevent uploading of confidential documents to online storage or free webmail sites.

File Extension

The File Extension module allows the administrator to specify a list of file extensions to block.

MIME Type

The MIME-Type module allows the administrator to specify a list of content types to block.

Safe Search

The Safe Search module forces anyone visiting Google, Yahoo!, Bing or YouTube to have "Safe Search" enforced regardless of whether the user disables it in their account profile.

Policy Manager

The Policy Manager allows you to easily manage filtering policies for your users and workstations. A policy consists of a set of rules and the rules correspond to the Content Filtering modules described. You can create any number of rule combinations and policies.

Open Policy

The Open Policy mode allows completely unfiltered Internet access to the specified user, workstation or group.

Closed Policy

The Closed Policy mode blocks all Internet access for the specified user, workstation or group.

Restricted Policy

The Restricted Policy limits the specified user, workstation or group to an administrator defined list of trusted Web sites.

Filtered Policy

The Filtered Policy allows the administrator to define which Content Filtering modules, and their respective filtering options, are active for a specific user, workstation or group.

Advisory Policy

Same as Filtered Policy except the user may Override any blocked requests.

Policy Scheduler

The Policy Scheduler allows the administrator to quickly and easily assign policies to users, workstations or groups which are active at different times of the day or week.

Automatic Active Directory Synchronisation

Synchronise CensorNet with Active Directory by OU or Primary Group. CensorNet will automatically replicate the AD structure and any changes made to it. Easy!

Time Quota

Set a daily time quota for accessing specific categories of Web sites (e.g. Travel, Shopping, Social Networking). When the time quota is used up, the web sites are blocked until the following day

User Manager

The User Manager allows the administrator to quickly add, remove or update user objects to the CensorNet system. Users can be imported from 6 authentication sources, including Microsoft Active Directory, Novell e-Directory and SAMBA. Any unrecognised users attempting to use the CensorNet proxy will simply be filtered using the Default Policy.

Bandwidth Limiting

The Bandwidth Limiting feature allows you to allocate a slice of bandwidth evenly for all users in a particular group.

Workstation Manager

The User Manager allows the administrator to quickly add, remove or update workstation objects to the CensorNet system. Workstations can be imported automatically using the "Probe LAN" tool or from a CSV file format. Any unrecognised workstations attempting to use the CensorNet proxy will simply be filtered using the Default Policy.

Suspend User

The Suspend User option allows the administrator to prevent a user from accessing the Internet temporarily.

Request Unblock

The Request Unblock feature allows your users to request that a page is unblocked if they feel it has been incorrectly blocked by CensorNet. A digest of unblock requests can be sent to the administrator by e-mail for review. Users can specify a reason and request an email when their request has been actioned.

Import Wizards

Import users and workstations from Active Directory using our easy to use import wizards.

Visits Report

The Visits report will show the exact pages and objects visited by a particular user or machine between a specific date/time range. The results can be expanded to show each individual URL visited and whether the request was allowed/denied and its classification.

Report Builder

The Report Builder allows the administrator to build customised reports based on the information collected by CensorNet. Any number of reports can be created based on different conditions, for example time/date, username, workstation, URL, filter module, violation and so forth.

Bandwidth Reports

Report on bandwidth usage by user, machine, category and domain.

Top 20 Reports

The Top 20 Reports provide a snapshot of useful information for the administrator, for example the Top 20 violating users/workstation, Top 20 most accessed sites and so forth.

Top Tables

The Top Tables Reports provide a 30 day overview of the most popular Web sites, most active users/workstations, most violating users/workstations providing the administrator with a birds eye view of their Internet usage.

Who's Browsing

The Who's Browsing report shows an instant snapshot of the users and workstations accessing the Internet through the CensorNet proxy.

PDF/CSV Reports

Export report results and snapshots to Adobe PDF or CSV format.

Crystal Reports

Access the CensorNet database via ODBC and use the power of Crystal Reports to generate custom reports and mine data held by CensorNet. Free ODBC driver available.

Archive Manager

On very busy networks CensorNet can quickly collect gigabytes of information. The Archive Manager allows the administrator to move old data to an archive to improve performance. Archives can also be included in the reports created using the Report Builder.

Web Control Panel

The CensorNet system is administered through an easy-to-use Web-based Control Panel, accessible using a standard Web browser (such as Internet Explorer or Mozilla Firefox/Netscape).

User Authentication

The CensorNet Proxy server can operate with or without User Authentication. CensorNet supports Microsoft Windows NT, Microsoft Active Directory, Novell e-Directory, LDAP, SAMBA and internal authentication sources. With User Authentication turned on, users will be required to log-in before accessing the Web.

Active Directory Synchronisation

Quickly and easily replicate your Active Directory OU groups within CensorNet and apply filtering policies.

Transparent Authentication

The CensorNet Proxy server supports NTLM allowing for transparent User Authentication on Microsoft Windows and SAMBA networks.

Workstation Authentication

The CensorNet Proxy server can authenticate workstations based on IP address or MAC (physical) address.

Web Cache

The administrator can specify the size of the on-disk Web cache, which is used to improve the performance of the proxy server.

Parent Proxy / Cache

The administrator can specify a parent proxy or parent cache, which will force CensorNet to pass requests upstream.

Backup / Restore

The administrator can Backup and Restore the CensorNet system easily using the tools provided.

Packet Trace

Diagnose connection issues with the inbuilt packet tracer and analyse the output using Wireshark.