Web Browsing & Content Security

Expand all

The Risk

An organization’s ability to control access to malicious web sites and prevent inappropriate content from entering and leaving its network is critical in minimizing business risk and maximizing employee productivity.

The uncontrolled use of the web within an organization can pose a serious security threat when personnel, knowingly or unknowingly, visit websites containing inappropriate material or harmful code.  Malicious code and content entering the organization’s network via requested web pages, could infect users’ workstations and as a result, interrupt the normal operation.  More importantly, it could expose sensitive data by providing covert internal network access to remote Trojans hosts or Botnets.  Furthermore, exhibition and distribution, within the organization, of inappropriate or unsolicited content, may give rise to image damaging lawsuits.

Moreover, extensive Internet usage may result in undue consumption of valuable Internet bandwidth and result in increased communication costs and employee productivity loss.

Protecting your Organization

A Web browsing and Content security solution will protect your network and systems against the above mentioned threats by analyzing the content and code entering your network, restricting access to potentially dangerous sites and content, and blocking inappropriate web browsing.

Odyssey will help your organization select the Web browsing and Content security solution that most suitably addresses both your current as well as future needs.

Striking the right balance between providing your staff with access to information they need to produce maximum results, versus restricting access to legitimate and appropriate web content only, is the most critical aspect of a web content security solution’s effectiveness.  For this reason, utilizing our knowledge and experience, we will devote major part of our deployment effort in assisting you to develop and enforce a Web browsing and Content security policy for your organization, which successfully strikes this balance.

Doing it right: Our Web Content Filtering Solutions’ Key Features and Benefits

Our Web Browsing & Content Security solutions are largely characterized by the following key features and benefits:

Key Features


Proactive, real-time identification and analysis of malicious content by scanning web pages’ active content, emulating and understanding its behavior and predicting its intent

Proactively protects the organization against malicious code and targeted attacks

Protects organizations from sophisticated web browser attacks, malware distribution and some types of social engineering

Enhances employees’ confidence in the productive use of internet

Provides up-to-date database of dangerous web sites covering multiple pre-configured categories and URLs, and matching URL filtering policy accordingly

Minimizes employee productivity loss by restricting access to inappropriate/dangerous content and the organization from unauthorized use of valuable Internet bandwidth network resources

Intergrates with third party Anti-Virus/Anti-Malware/Anti-Trojan solutions

Provides additional level of protection
Detection of Virus/ Malware/ Trojans within the SSL communication and web site certificate validation

Eliminates the risks of malicious software and tunneling of other protocols through encrypted HTTP tunnels

Greater visibility and protection for the organization’s internet users

Protect from phishing and “rogue” websites

Powerful reporting capabilities and customizable dashboards

Identifies usage trends, isolates problems, documents inappropriate web activity and complies with regulations

Flexible policy creation enforcement and enterprise-class logging and reporting capabilities

Minimizes compliance workload and reduces administrative costs

Powerful policy engine enables unmatched flexibility and control in creating and applying policies

Provides flexibility in creating and applying policy as well as in controlling web applications

Intergrates with user directories such us LDAP and/or Microsoft Active Directory

Flexibility in applying different access policies to different group of users

Easy integration with Data Loss Prevention technologies

Prevents confidential and sensitive information leaving the organization

Provides immediate notification on a URL enforcement policy violation

Help employees to identify internet misuse attempts and provide administrators with valuable information facilitating troubleshooting in case of issues


Remaining Secure – Support tailored to your needs

We very well understand that to remain effective, a security deployment requires constant monitoring, fine-tuning, updating and maintenance.  These requirements may prove a burden your organization may not be poised to undertake.  We have, therefore, structured our post-deployment services so that you may have the level of support you need, in order to achieve maximum return on your investment, with the least of worries.

Our suite of post-deployment services range from simple Maintenance and Support, to full-fledged Managed Security & Outsourcing Services.

This solution comprises part of the “Design & Implement” phase of our Information Security Continuum (D&I).