The new security tool controls and monitors access while helping companies enforce company-wide policies

  Hornetsecurity has presented a new version of the Webfilter Connector. As part of the proven Webfilter Service, the tool is used for user authentication to the Webfilter Proxy and, depending on the setting, it can block news pages or websites with pornographic content as well as forums or applications such as Skype or MSN Messenger. The new Hornetsecurity solution thus enables the enforcement of pre-defined corporate policies – right down to the user level. Groups can also be formed, allowing you to set up internet usage for different departments. The new Webfilter Connector is now available for download from Hornetsecurity’s control panel.   The dangers of the internet are well known: In addition to malware from spam emails, small and medium businesses (SMBs) are faced with increasing problems from web-based attacks. To effectively protect corporate IT from malware, phishing and other threats, the cloud security provider Hornetsecurity provides, among other things, the Webfilter Service, whose essential component is the new Hornetsecurity Webfilter Connector. To use the Webfilter Service effectively, users must register once at the Connector – then they can securely surf the internet or use internet-based services, so long as their use has been approved by the company IT. The administrators equip the proxy (via which the internet traffic is routed) with appropriate policies. The Connector can either be downloaded directly from the control panel or administrators distribute the software centrally. Installation takes only a few minutes.   Implement corporate policies easily and automatically   The service starts automatically after installation and works quietly in the background. The Connector attaches an individual piece of authentication information to each data packet that is sent towards Webfilter Proxy. Based on this information, the corporate policies can then be enforced – this prevents the users from surfing on blocked websites on which, for example, drive-by downloads are located or employees are using undesirable internet-based programs to exchange data.   Each connector has an authentication code that is individually tailored to the user and preinstalled, so that the user neither has to worry about the setup nor make any entries. The user only has set the preferred browser in advance such that subsequently all inquiries reaching the user are first sent to the proxy and no longer redirected straight onto the internet.