Scenario for Solution to Monitor and Control Web Traffic
Outline the steps for deploying a solution to monitor and control web traffic.
The SIS Team has a full understanding of the importance of monitoring and controlling web traffic across an Enterprise network infrastructure. Our team has deployed many such solutions which are typically deployed with either a content filtering appliance or software on a physical or virtual server. Some of the options include: Cisco Content Security Manager (CSM), Juniper Junos Integrated Web Filtering, Barracuda Web Security Gateway and Websense Content Gateway (Forcepoint).
Any content filtering platform must provide a proxy service for filtering web content of enterprise users accessing the Internet. The content filtering platfomr can either be deployed as a function of a Web Security Gateway Appliance or as software on a linux based platform. Most platforms content filter categorizations are against websites, http(s) content inspection, as well as proxy caching. The categorization and inspection allows the platform to identify and filter traffic based on content to either permit or deny web page requests based on the configured policies. The caching capability on the other hand helps to enhance the user experience. It caches web content for a quicker local response to user web queries as well as reduced bandwidth requirements. In addition, most platforms can scan incoming content and files from the internet for malicious or executable content and either block or strip the active portions of the content.
When deploying Content Filtering, our team will follow a standardized set of best practice implementation processes based on ITSM and ITIL. This includes the following phases 1) Initiation, Concept and Requirements Definition 2) Design 3) Implementation and 4) Turnover. The deployment steps can be seen in the diagram below:
Content Filtering Solution Deployment Steps
The SIS Team brings Subject Matter Expert (SME) level information technology, engineering, and professional services with proven accomplishments in supporting large mission critical IT infrastructure environments. Our team has successfully implemented similar solutions.
Sample Performance Measures:
- Security violations per audit
- Percent of audits conducted on schedule
- Percent of applications checked per schedule
- Number of security problems identified by end users versus total vulnerabilities identified