The most accurate product that is available in the
market. The filtering results may
reach to 100% accuracy.
The use
of proprietary technologies allows the authorities and administrators
to prohibit user access to all the disapproved web sites, while
allowing user access to some web sites just for educational purposes.
Is
fully owned and installed on home computer, and remote server computer.
The only
product in the market that does not require external dependencies or
resources for protecting families, and businesses.
May be
launched manually, or automated. It is equipped with a private
and programmable 24X7 Scheduler for supporting up to 48 different
environment requirements.
-
Blocks
File Downloads
- Blocks Music Lyrics.
- Blocks Use of Messenger.
- Blocks Peer-to-Peer (P2P)
Applications.
- Restricts Use of Email.
- Shuts Down/Restricts Web
Access during the Scheduled Hours.
- Programmable for every 30
minutes time slut.
- Access customization may vary
from a full shut down up to a full unrestricted access.
- Pre-Programmed for average
users.
Is built to
be maintenance free. It uses well-maintained and daily updated
lists and dictionaries. Administrators may choose to update or
add their own lists. Administrators may share lists among other
users.
It is extremely scaleable, and faster than any
other service-based, or client-based products.
It provides the most comprehensive and accurate
filtering and security System. This allows the use of
maximum security and privacy protection for families, and businesses.
Fully protects confidential information over
email communications, and online web access.
Fully protects against impersonation, hijackers,
intruders, and Spyware.
Is not part of the ISP services; therefore,
it cannot be terminated unexpectedly.
Supports all operating systems, including Mac OS, and
Windows.
Supports
all types of Internet accesses.
Supports all standard web-based browsers, including Netscape Navigator,
Microsoft Explorer, and AOL.
Provides a private
and customized domain and content filtering system for individual
family members or group of users on home and remote computers
Supports
anonymous users.
Provides Soft/Hard Domain Filtering. Administrators may receive
optional alerts for user-disapproved actions (blocked, or not).
Provides Soft/Hard Content Filtering. Occasionally, the contents
coming from the approved web sites may contain disapproved
materials. This feature allows the authorities to further
regulate such contents. The contents may be partially cleaned, or
may be fully stopped reaching certain users.
Supports
the web access to few approve categories, and documents, while
the rest are disapproved. Alternatively, may restrict the access
to few disapproved categories, and documents, while the rest are
allowed.
Provides layered Email Filtering. It supports the use of Spam Email Blocking; in
addition to the use of Email content filtering itself. This
restricts the email usage to approved recipients, subjects and proper
messages.
Provides Soft/Hard Spam Email Filtering. This
allows administrators to restrict the approved user emails to few
addresses, and subjects. Alternatively, user emails are allowed
in general, but they may be restricted for exceptional addresses, and
subjects. The restricted emails may only be disabled within the
user email inboxes. Alternatively, the suspended emails may be removed
from the user email inboxes.
Provided Soft/Hard Email Content Filtering. The second layer will
filter the messages for proper categories, and
materials.
Provides
a privacy shield for protecting confidential information such
as user names, residential addresses, emails addresses, credit card
numbers, and etc. The user security rules may be set for
different types, or sets of protection. While, administrators
will have no restrictions, their children may not use such protected
information on the web.
Provides
user-friendly administrative tools.
Provides
monitoring tools to aid administrators in supervising each individual
child. This tool enables administrators to monitor their
children's access histories and locations.
Provides an optional alert system
for all the user blocked attempts.
The alert system may be tuned on/off. While the user access
violations, and disapproved actions may not be blocked, the alert
system will send reports to administrators with the data such as the
user name, the access date, and the violated
actions.
Allows creation of
unlimited customized web user accounts, in additional to anonymous user
account.
Administrators
may create individual accounts for their children and other family
members, and will personalize the security rules for each user
account.
Administrators
personalize the security rules for each user account. User
accounts will be used for manual and automated application launches.
When
the application is launched manually, each user account requires a
username and password (Authentication: User). When the
application is launched automatically, it does not require user
authentication. Its 24X7 operations is guided by its scheduler.
When
the application is set in automated mode, it will start functioning
after the computer is turned on. It will use a programmable
scheduler for proper behavior. The system will use the designated
user account during the programmed hours. The system may even
shut down the web access during the desired hours. This will
restrict user web access during certain hours.
It is simple, and
it does not require advanced computer experience.
It is
extremely secure for all user ages.
User access lists
are divided into two categories: 'friendly' and 'unfriendly', and each
user has its own access lists. Administrators customize these
lists for the individual children.
Parental defined blocks are built by appropriate use of individual user
lists. The domain filtering is executed extremely efficient by
using high-speed pattern matching
technologies. This optimization technique will significantly
minimize processing time and delays.
Provides partial
or full access to all trusted web sites while stopping all other
requests.
Provides superior email protection beyond the commonly practiced
industrial Spam email protection. This allows administrators to
specifically deny or partially restrict certain emails to reach their
children.
Provides superior
privacy and security customization features beyond the capabilities of
other ISP-based systems. This offers complete confidentiality without
interruptions to the current system. The user may simply remove the
ISP-based security features to minimize the account cost overheads.
The off-the-shelf
account setups will be sufficient for immediate use of the
application. The application provides easy to use account
utilities for user profile personalization.
User profiles are
locked and are protected against service providers.
Provides a safe HTTP proxy server with the proxy chaining, and proxy
script capabilities.
Supports the use of the ISMT
tools, such as popup blocker, intrusion control, hijacker/Spyware
blocker, and etc.
Supports the
use of the eSecure
Suite for protecting user computer file
systems, secure file shredder, and email confidentiality.
