Products and services

xTerminator

xTerminator is a state-of-the-art anti-pornographic filtering proxy that aims to protect small and medium size LANs (up to several hundreds of PCs). In addition to the industry-standard approach of checking URLs against a pre-compiled black list, the system classifies web-site content “on-the-fly” (both text and images) using advanced statistical techniques. This greatly improves the effectiveness of filtering, since it makes the process much less dependent on the contents of black-lists being always up-to-date, which is difficult to achieve with in practice.

Unlike many other content filtering systems, xTerminator can efficiently classify previously unseen websites, as well as ones for which the content is dynamically generated. xTerminator is highly configurable, with system administrators having control over many of its operational parameters, e.g.,
- maximum response to user content request,
- image filter decision threshold,
- min/max size of images to classify,
- the rules of automatic web sites classification

Deploying xTerminator  in an enterprise environment  discourages employees from visiting questionable content while at the same time protecting the corporate LAN from numerous threat vectors associated with visits to pornographic web sites (e.g., infections with malware, adware, spyware, viruses, worms, etc.). Another important application of xTerminator is in the area of protecting children and minors from accessing sexually explicit content (aka parental control).

xFinder

This product is specifically addressed to customers wishing to periodically search their data repositories (e.g., hard drive contents) for presence of pornographic images (e.g., to detect content violating corporate governance rules). xFinder is based on the same image classifying engine as xTerminator.  

Researching the Internet users' behavior

Many corporate network administrators and/or security officers analyze proxy server logs looking for suspicious requests. Among them, references to porn web sites represent an important segment that might be potentially dangerous to a corporate network. In the past, so called dialers were a plague that affected many porn site visitors. Nowadays there are numerous more sophisticated threats representing different types of malware (viruses, rootkits, trojans, etc.). Exposure might result in the theft of a user’s identity or the external access to confidential information. The severity of this threat to enterprises is supported by security research indicating that about 70% visits to porn web sites take place between 9 a.m. and 5 p.m, i.e., with a large portion of them likely originating on various corporate networks.
There are many software tools that facilitate statistical analysis of Internet/Web traffic based on proxy server logs. However, an in-depth analysis restricted to a specific class of requests often requires a dedicated solution. One particular challenge is how to find references to porn sites among millions of legitimate requests in massive enterprise-scale logs.
For customers interested in such a service, GuardLogic offers competitively priced analysis of proxy log data with 100% confidentiality guarantee. Please contact us for more details.

Szukaj na witrynie