Internet Access

GFI Webmonitor -Proxy Server

To Buy
Contact us

GFI WEB MONITOR

mdaemon
Monitor and control web activity
Uncontrolled web activity can impact productivity, lead to malware infections, increase costs and potential legal liabilities, as well as a bruised company image. GFI WebMonitor delivers unique web filtering capabilities by combining application-based traffic filtering with a website categorization functionality. Together they allow accurate control over what users are doing online and the applications they are using.

mdaemonbyod
Manage bandwidth and internet usage
Browsing websites like YouTube® and spending time on social media sites like Facebook can take up a huge chunk of bandwidth. GFI WebMonitor’s bandwidth control capabilities help administrators manage how that bandwidth is utilized and, in turn, reduce costs. Intuitive dashboards give a clear, detailed picture of how much bandwidth goes into productive activities, and how much of it is wasted on fruitless browsing. Then take full control over how it should be used.

    mdaemonbyod
    Secure downloads and web browsing
    Protecting the network against web-based threats is a major challenge for IT and security admins. Ignoring the dangers of online activity can lead to malware infections or data breaches. As a result organizations could incur heavy costs, poor productivity, downtime, compromised business-critical information and increased IT costs to repair the damage. Don’t let your reputation be tarnished if you can prevent it. GFI WebMonitor scans downloads in real-time using up to 3 antivirus engines to ensure malware-free downloads

      Features

      Application control

      GFI WebMonitor can block web applications by name and category using advanced inspection technology.

      Social controls

      Social controls can block Facebook applications, games and other social networking functions, enabling you to control access without completely blocking the site.

      Remote filtering

      Company laptops should be used appropriately. GFI WebMonitor enables you to apply filtering policies and web monitoring even when not connected to the corporate network.

      Search engine monitoring

      Search queries provide valuable insight into the mindset of your users. Monitoring queries can help identify and prevent high-risk behavior.

      Surf time policies

      Surf time quota policies enable administrators to strike a balance between productivity loss and unhappy employees.

      Tackle web-based threats

      GFI WebMonitor delivers excellent zero-day threat protection by scanning all downloads using up to 3 antivirus engines.

      WebInsights

      The WebInsights dashboards within GFI WebMonitor deliver context around factual data and builds historical and behavioral trends based on the web activity in your corporate environment.

      Action-based alerts

      GFI WebMonitor features various configurable alerts that notify relevant stakeholders when possible high-risk situations develop.

      Block connections in real time

      GFI WebMonitor gives precise control to IT administrators, enabling them to identify large downloads and block them in real time.

      To Buy
      Contact us

Wingate Proxy Server

To Buy
Contact us

WinGate Proxy Server

wingatebox
WinGate Proxy Server is a sophisticated integrated Internet gateway and communications server designed to meet the control, security and communications needs of today’s businesses. In addition to a comprehensive range of features, WinGate Proxy Server’s license options provide you the flexibility to match your needs to your budget, whether you need to manage an enterprise, small business, or home network.
Key Functions
WinGate Proxy Server allows you to:

  • Provide secure and managed Internet access for your entire network via a single or multiple shared internet connections
  • Enforce advanced and flexible access-control and acceptable use policies
  • Monitor usage in real time, and maintain per-user and per-service audit logs.
  • Stop viruses, spam and inappropriate content from entering your network
  • Provide comprehensive internet and intranet email services.
  • Protect your servers from internal or external threats.
  • Improve network performance and responsiveness with web and DNS caching
  • Ease administration burdens on your internal networks.

Key Benefits
Using WinGate Proxy Server to actively manage the use of your Internet and network resources can provide many benefits, including:

  • Improved Employee productivity through reduced time wastage
  • Reduced time and resources required to maintain network integrity
  • Reduced Employer liabilities
  • Improved efficiency, responsiveness and reliability of network access

Internet Sharing

WinGate
WinGate Proxy Server will share most types of Internet connection, allowing multiple users to simultaneously surf the web, retrieve their email, or use other internet programs, as if they were directly connected to the Internet. Whether it is a simple dialup modem or high speed fibre, WinGate Proxy Server can help to make the most out of the connection. WinGate Proxy Server supports a wide variety of Internet protocols, allowing applications such as Web browsers, messaging software, FTP and SSL. WinGate Proxy Server also supports DirectPlay Internet games and Real Time Streaming Audio/Video.

Control Internet Access

With WinGate Proxy Server’s user database and policies, administrators can limit and control user access to the Internet. With logging, auditing, and a real time activity and history viewer, detailed records of user activities can be easily examined. This makes WinGate Proxy Server ideal for companies, schools, Internet cafes or any environment where Internet access needs to be monitored closely.

Built-in Security

WinGate Proxy Server comes with a built-in packet-inspecting firewall. Your network safety can be further enhanced with optional plug-in components, available seperately, which will scan incoming data for viruses, or filter out inappropriate content in web traffic.

To Buy
Contact us

Wingate VPN Software

To Buy
Contact us

WinGate VPN

wingatebox
Ever caught yourself working late at the office thinking “if only I could access my work machine from home I would be there now?” Ever been on the road with your laptop wishing you could access company files, even print out documents on your company printer? Do you have a need to securely transfer files from one place to another, without people having to learn how to use complex file transfer applications?

If you answered yes to any of the above questions, you could be in need of a Virtual Private Networking (VPN) solution. VPN solutions have been available for some time, but up until now, you had to be a networking genius to make it work.

Now there is a VPN solution that anyone can use.
When we were designing WinGate VPN, we looked around at a number of other products. Most were very difficult even for us to set up, let alone someone who isn’t a network expert. We decided that most of the configuration of a VPN shouldn’t have to be such a burden, and should be done automatically. Most people just want the thing to actually work, and be able to trust it. Yet they don’t want to sacrifice flexibility or features either.

In a very short space of time, WinGate VPN allows you to connect your networks together, whether they be office LANs, or a home PC, or a laptop on a modem, so they can share data safely and securely. Using state of the art security protocols and tunnelling technologies, WinGate VPN will make sure that you can participate in a remote network, almost as easily as if you were plugged into the same hub. Depending on individual set up, users can access common local area networking features such as file and directory exploring, mapping drives and even participation in LAN games.

Easy to set upeasySetup
Whether you are running WinGate VPN as a stand-alone system, or integrated with an existing WinGate installation, WinGate VPN is one of the most easily configured virtual private networking products available today. Set up in a matter of minutes, WinGate VPN can utilize most Internet connection types such as modems, wireless, ISDN or ADSL to create a secure private networking environment across the Internet. It will even work through your corporate firewall or NAT/DSL router or both!

Built-in Firewall
Since you will be connected to the Internet, WinGate VPN also comes with a built-in firewall to protect each end-point of the VPN. WinGate VPN also comes complete with real time monitoring, showing details of all VPN connections that are in progress, and the current status of the VPN tunnels. With a point and click style Network window, administrators have total control over each part of the communication process, and can easily check that the VPN is operating properly at a moments notice.

Extra support for MS Networking
WinGate VPN makes it easier to browse using network neighbourhood across your VPN without having to set up and configure expensive MS server platforms or WINS servers. UDP relay broadcasting makes all your networks look like they are on the same physical network segment.

Industrial-Strength Security
WinGate VPN uses industry-standard and trusted SSL connections and X.509 certificates to connect and validate your VPN users. It uses 128 bit Twofish-encrypted data tunnels to provide the security and speed you want. With various licensing options for different networking structures WinGate offers the flexibility you require.

WinGate VPN is ideal for:
  • Companies who need secure inter-office networking.
  • Home users who wish to set up a secure peer-to-peer connection between remote PCs.
  • Home or Mobile workers, who require a secure environment to connect to the office from remote locations.

To Buy
Contact us

Internet Access Monitor

To Buy
Contact us

Internet Access Monitor

internet_access_monitor_big1

Internet Access Monitor is a software product for monitoring the efficiency of the internet bandwidth usage by your company’s employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer traffic they create.

Internet Access Monitor benefits:

  • allows centralized monitoring of your employees’ internet access
  • prevents personal usage of corporate bandwidth
  • reduces your internet expenses
  • extremely easy-to-use; can start monitoring users in a just a few minutes once the installation is complete
  • works with all modern proxy servers
  • allows the generation of a great number of reports and diagrams which display the efficiency of your company’s proxy server usage
  • has a task scheduler to automate the creation and delivery of reports to authorized personnel

How the program works

Internet Access Monitor is a comprehensive internet use monitoring and reporting utility for corporate networks. The program takes advantage of the fact that most corporations provide internet access through proxy servers, such as MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Each time a user accesses any website, or downloads files or images, these actions are logged. Internet Access Monitor processes these log files to offer system administrators a wide range of report-building options. The program can build reports for individual users, showing the list of websites visited, along with detailed classification of internet activity (downloading, reading text, viewing pictures, watching movies, listening to music, working). Plus, the program can create comprehensive reports with analysis of overall bandwidth consumption, building easy-to-comprehend visual charts that indicate the areas where wasteful bandwidth consumption may be eliminated.

internetAccessMonitor

System requirements

  • Windows 95/98/ME/NT/2000/XP/2003/Vista/2008,
  • 128 RAM;
  • 10000 Kb free disk space.

To Buy
Contact us

WEB PROTECTIONimg

To Buy
Contact us

Web Protection

Beat the bandwidth drain
Keep your company safe from security breaches, legal liability and costly virus clean-ups by blocking malicious websites and receiving alerts about bandwidth consumption. Video chats, streaming media and continual content downloads increase the drain on company bandwidth. If done in excess, these bandwidth-hogging actions can bring business operations to a crawl. Stay on top of bandwidth usage with alerts when devices exceed thresholds so you can quickly take action to avoid unwanted costs or a throttled network.

  •  
  • Gain real-time graphical views and alerts of bandwidth usage
  • Manage and monitor the entire network from a single online console

mdaemonbyod
Save colleagues from themselves
Let’s face it: Internet users aren’t all web-savvy. That’s where ControlWebProtect makes a big difference. Our easy-to-use, cloud-based console enables you to quickly gain control of user web browsing. No dedicated server or proxies to configure. Simply apply web content filtering policies across more than 80 website categories to help users stay productive and protect your business from legal liability.

  •  
  • Block website-pushing malware, phishing sites, proxies, spy and adware, botnets and spam
  • Protect your business from legal liability

mdaemonbyod
“One size” doesn’t have to fit all
Depending on the device type, specific browsing controls are automatically applied upon installation. This ensures appropriate protection for all servers, workstations and laptops, whether they’re located at the office, on the road or in the employee’s home. And because protection policies are easy to configure, managing machines isn’t difficult. In fact, you can coordinate between security categories to maximize protection.

  •  
  • Restrict usage by policy or individual device level
  • Configure thresholds to gain greater control

mdaemonbyod
Around-the-clock coverage
Non-stop security shouldn’t be considered a luxury. ControlWebProtect runs security updates every 5 minutes to safeguard your machines from the latest online threats. Your systems are continuously protected, which reduces the risk of data breaches and setbacks in productivity. At a glance, you can view web usage of your network. Plus you will receive instant notifications that alert you to breaches in internet-usage policies and attempts to upload data files that surpass a configured threshold.

  •  
  • Be up, running and protected in minutes
  • Protect endpoints and centralize control from a single online console

To Buy
Contact us