ContentKeeper Web How It Works

advertisement
ContentKeeper Web
How it works
A less technical view
4/13/2015
1
Objectives


To provide in simple terms, an overview of
how ContentKeeper Web works.
This presentation is not intended to provide
an exhaustive overview of features of
ContentKeeper.
4/13/2015
2
How does it work
Place an appliance (P/C) in the internet path
All traffic to and from the internet passes through this
appliance
4/13/2015
3
Appliances
SB3 Front
SB3 Rear
4/13/2015
4
What is an appliance

A purpose built P/C supplied by
ContentKeeper or by the Customer
4/13/2015
5
4/13/2015
6
Or TSW-Built
Tower/Desktop 2500 Filtered P/C’s
IRU Quad Xeon – 10 000 + Filtered P/C’s
Or build your Own
We will provide specifications
4/13/2015
7
How does it work
As each message passes
through the appliance….
Logs it.
Policy
File
Examines it against our URL
file and against a policy file.
And either allows it to go
through or sends the user a
block screen,
4/13/2015
LOG File
URL
File
8
How does it work
The URL file (stored in memory)
contains an entry for every URL
that has ever been accessed by
any ContentKeeper user in the
world.
Policy
File
URLs are classified according to
content.
More about how we maintain the
URL file later.
4/13/2015
LOG File
URL
File
9
How does it work
The policy file contains the
predefined access policies for the
site (up to 200 policies per client)
Policy
File
What classifications of site
can be accessed.
When they can be accessed.
What file types that can be
downloaded.
If the URL request does not
conform to the policy it is blocked.
4/13/2015
LOG File
URL
File
10
How does it work
The log file contains a record of
each web session
Policy
File
Information such as
User Name
URL Accessed
Time spent on the session
URL classification
MB Used
4/13/2015
LOG File
URL
File
11
How does it work
Canberra Support
Center
Communicating with the
ContentKeeper site
On an hourly basis the appliance
will receive new discovered and
classified URL’s from the central
ContentKeeper site.
The central site will receive any
URLs that have been discovered
on the clients appliance.
We also use this link to download
new software and for support
4/13/2015
Policy
File
LOG File
URL
File
12
How does it
work 7
Canberra Support
Center
What happens if a user
accesses a URL that we
don’t have recorded in the
URL file?
Policy
File
LOG File
4/13/2015
URL
File
13
How Does ContentKeeper
Do It?



ContentKeeper has a built-in
real time engine to catch new
sites as well as the industry’s
most up-to-date site control
list.
Any new suspect URLs
discovered locally, are
encoded, encrypted,
compressed, and sent back
every hour to the Data
Centre.
The Data centre automatically
analyses the URL using its
more comprehensive AI
programs.
4/13/2015
14
Closed-Loop Collaborative
FilteringTM Technology
(Global Collection with Hourly Updates)


All other Contentkeeper
sites will have their URL
files updated at the next
hourly update.
In this way all users of
ContentKeeper contribute
towards keeping the URL
list up to date.
Additionally CK Canberra have an automated process that gathers, analyses,
categorises and adds previously undiscovered URL’s to the hourly trickle.
4/13/2015
15
For example
*** Optional – skip to 19 ****






At the Users Site ……
Now if a user in London goes to a brand new site the request packet
is inspected by ContentKeeper. Firstly, ContentKeeper checks the
URL in the URL file in the appliance and if the URL was found, acts
according to the policies in the policy file.
If the URL is not found then the AI engine kicks in and starts
analyzing the data stream in real time.
ContentKeeper will allow the first page through so that it does not
slow down the network traffic. About 60 seconds later, when our
friend is about to click on the next link on that web site, the AI engine
has finished its job and that site will be blocked instantly.(If it does not
conform to the policy).
Meanwhile the newly discovered URL is stored in the appliance.
And sent to the ContentKeeper data centre at the hourly update.
4/13/2015
16
At the ContentKeeper
Data Centre
At the Data Centre
 The discovered URLs are passed through all the
ContentKeeper AI engines for in-depth analysis.
 If they come out of that process still looking like porn for
example, then they are added to the Global Control List
and collected by every ContentKeeper appliance
worldwide during the next hourly update cycle.
4/13/2015
17
Back in London….



Our user who may have received one of those SPAM emails,
may have been the 1st guy in the world to go to this new site.
With the traditional products it’s like a wide open gate, they
are powerless to stop them.
With ContentKeeper, the site will be blocked locally within 60
seconds and then within an hour or so of discovery, that new
site is blocked in Thailand, Europe, UK, USA, Australia and all
around the world.
4/13/2015
18
Closed Loop Collaborative
filtering
The Key differentiator….

Whereas the traditional filtering companies employ approximately
20 to 40 staff and single point web crawlers looking for new sites,
ContentKeeper has several million users discovering new sites,
automatically, 24 hours a day, 7 days a week.

Clearly, ContentKeeper’s globally based CLOSED LOOP
COLLABORATIVE FILTERING TECHNOLOGY is a far superior
methodology for tackling this global problem. Better than any other
solution on the market today.
4/13/2015
19
There’s More …
ContentKeeper’s Quality control is built in!.




Other vendors have no effective Control List review with only
approximately 40 staff.
ContentKeeper once again utilizes CLOSED LOOP COLLABORATIVE
FILTERING to insure the quality of the database.
Whenever any of the ContentKeeper administrators/users around the
globe come across an incorrectly classified URL, they can simply and
instantly re-classify that URL fixing the problem on their own site while
at the same time automatically contributing to the Quality of the Global
List by submitting a reclassification request.
The request is handled by the data centre in the same way.
4/13/2015
20
This Means …



This means that while the competitor's control list is
increasing in a linear fashion, ContentKeeper’s list is
growing exponentially.
While their control list quality is increasing in a linear
fashion, ContentKeeper’s list is improving exponentially.
Whereas their quality control relies on their own staff
(<40), ContentKeeper has several million users,
automatically helping to maintain and improve quality,
working non-stop around the globe.
4/13/2015
21
Administrator Functions



A simple easy to use interface allows the client’s ContentKeeper
administrator to
 examine web activity in real time
 extract reports
 determine areas of possible abuse
 Establish and modify policies
ContentKeeper includes all the required software – there are no
optional chargeable add-ons.
Except for (optional)



Advanced Reporting Module which allows the administrator to produce a large
variety of reports from the ContentKeeper log files
Appkliance Integrated Kasperski Anti-Virus
Online Monitoring Tool
4/13/2015
22
Extracted from an
actual evaluation
at a large private
school
Example
Usage Report
What little Johnny is
doing on the school’s
network.
4/13/2015
23
Other Features



Peer to peer blocking
SSL tunneling prevention
Surfing Units
Please see standard presentation for a more detailed presentation
4/13/2015
24
No Hidden Extra’s

All inclusive Pricing







Telephone and Email support
Installation
Software upgrades
URL files updated hourly
Initial Administrator Training
Administrator facilities
Optional Extras



4/13/2015
Advanced Reporting Module
CK (Kasperski) Anti Virus
On Line Monitor
25
How do we proceed?



Install ContentKeeper in client’s site in “Silent Mode”.
This takes about 20 minutes.
After a period extract logs from Appliance and Produce
savings report.
The savings report will tell you
 How your bandwidth is being consumed.
 What site categories are being accessed.
 What productivity losses are being incurred.
 The savings that would be made by enforcing a
sensible policy.
4/13/2015
26
Questions and Demonstration
4/13/2015
27
Download