SlideShare a Scribd company logo
GATEWALL
DNS FILTER
Filtering traffic by DSN requests
SECURITY ISSUES

 Over 90% of viruses infect your machine via the Internet
 The number of infected websites keeps growing
 The number of new websites grows exponentially

 The growing popularity of social network brought new types of fraud
          designed to obtain t a victim’s personal information.



It is often difficult to distinguish a phishing website from a normal site.
ENTENSYS DATABASE VS FREEWARE ANALOGS
Blocking websites that contain phishing links, Trojans, keyloggers,
botnets and malicious software



                                                               Some 100,000
                                        3,280,000                 new websites
                                                                  are added daily
                                                                  Information on
                                                                  malware
                                                                  websites comes
                                        5,035,000
                                                                  from multiple
          322,000                                                 sources

    Google Safe Browsing API      UserGate DNS Filtering DB

       Known malware websites
      Известные сайты с malware   Сайты reputation websites
                                   Poor с низкой репутацией
DYNAMIC APPROACH BENEFITS
PORN SITE CREATION EXAMPLE:
1. Create a website about butterflies
2. Classify the website as an educational page about animals (dynamics
and statics)
3. Replace content with pornography
4. With static approach, the site will be categorized as a site about animals
5. With dynamic approach, its category will be changed to Porno


      DYNAMIC APPROACH                            STATIC APPROACH
   Some 100,000 websites get modified      Category updates are rare
    every day                               As a rule, the update process is
    Information on malware websites          launched manually
    comes from multiple sources
    Database contains around 500
    million websites
    Database is kept constantly updated
EMPLOYEE EFFICIENCY

 24% of the sites that office employees visit are social network sites
 Around 55% of website requests are not related to their work
 The main goal of a social network is to make a user spends as much time
   as possible on the website



  Companies with 20 to 100 employees show the highest percentage of
                     unwarranted Internet usage.



 HOWEVER, such primitive restrictions as keyword blocking or black and
  white lists may have a negative effect on employees’ performance.
GATEWALL DNS FILTER – THE SOLUTION


    Uses SaaS model (Software-as-a-Service)
    Filters websites (500 mln URL database)
    Protects from malicious software
    Generates Internet usage reports and statistics




    Internet usage monitoring
    Increased Internet security
    Less unwanted traffic
    Better employee performance
ARCHITECTURE
HOW DOES IT WORK?

   Denial by categories (82 categories with 500 mln websites)

   Black and white lists

   White list inclusion request web-form

   Website category modification request web-form

   Advanced fail-safety

   Web statistics (reports)
BLOCKING URL CATEGORIES

        An administrator may easily configure the application to block
        sites belonging to the following categories:



 Porn sites                           Social networks
 Malware websites                     Torrents and P2P networks
 Online gambling sites                Gaming and entertainment
                                         portals
 Proxy servers and anonymizers
CUSTOMIZABLE BLACK AND WHITE LISTS



                               Some websites are blocked
White lists guarantee access
                               regardless of other network
to certain websites
                               settings
REPORTS
 Statistics by hits and categories
 Lists of blocked websites
POTENTIAL USERS
PUBLIC INSTITUTIONS                     SMALL- AND MIDSIZED
   Schools                             BUSINESSES
   Social insurance agencies              Banks
   Tax inspectorate offices               Insurance companies
   Municipal and regional                 Mining companies
    administrations                        Distribution networks
                                            Etc.



INTERNET SERVICE
PROVIDERS                               GateWall DNS Filter:
    Home networks                      A handy tool that allows Internet usage
    Second-tier ISPs                   control in companies of any size and
    Large ISPs                         companies with a spread out
    Business centers                   infrastructure
   * Individual approach to each ISP
PUBLIC INSTITUTIONS

 Schools and other                         Social insurance agencies
   educational institutions                 Retirement funds




Internet access at schools is one of the   Public Internet services
priority tasks of governments in many      Every year, many projects are
countries.                                 launched that involve different
These projects in almost all cases         technologies and require the use of the
require Internet usage at schools to be    Internet. Hence the requirement to
monitored.                                 control and secure Internet access.
SMALL- AND MIDSIZED BUSINESSES
 Proactive protection                     Employee
                                             performance




                                          Allocation of Internet traffic by
 Websites from the most dangerous
                                          categories, time and date. Websites
 categories are blocked (Spyware,
                                          that are not related to work (including
 Malware, Adult, Porno, Social
                                          social networks, online gaming portals,
 Networks, etc.). Category listings are
                                          etc.) are blocked. This helps improve
 constantly updated.
                                          employee performance.




Copyright © 2009 Entensys Corporation
INSTALLATION AND INTEGRATION

   Each project is reviewed individually

   Compatible with Microsoft NLB (Network Load Balancing)

   Flexible billing system (monthly or annual billing)

   API for integration with ISP’s billing system

   API for rules management from client account page

   Integration assistance
SIMPLE SOLUTION

    Cloud-based model

 GateWall DNS Filter does not require local installation of any hardware or
    software solutions

 The program remembers the current network mapping, security settings
    and processes executed by all existing applications

 URL database updates run in the background and do not interfere with
    the users’ work
SOME ALTERNATIVES

OpenDNS
A solution for large- and midsized companies
and schools (K-12 schools)




WebSense Hosted Web Security
One of the world’s top vendors of information security
solutions
ENTENSYS COMPANY
   Founded in 2001
   Offices in Moscow, Novosibirsk, Leipzig (Germany)
   Staff: more than 40 employees
   More details about the company and other products: http://www.entensys.com/

  STRATEGIC PARTNERS




Kaspersky Lab       Panda                BrightCloud        Commtouch
Russia              Security             USA                Israel
                    Spain

More Related Content

PDF
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
PDF
Advanced Web Security Deployment
PPT
FaceTime Web 2.0
PDF
[Infographic] Data Loss Prevention
PDF
Working remotely due to the coronavirus? This technology from your employer i...
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
[Infographic] 7 Cyber attacks that shook the world
PDF
Top 5 Cybersecurity Risks in Banking
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Advanced Web Security Deployment
FaceTime Web 2.0
[Infographic] Data Loss Prevention
Working remotely due to the coronavirus? This technology from your employer i...
Five Network Security Threats And How To Protect Your Business Wp101112
[Infographic] 7 Cyber attacks that shook the world
Top 5 Cybersecurity Risks in Banking

What's hot (20)

PDF
Infosecurity 2012 Banja Luka
PDF
Cisco Content Security
PDF
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
PDF
Enabling a Zero Trust strategy for SMS
PDF
2012 nq mobile_security_report
PPTX
Data security for healthcare industry
PPTX
Security Minded - Ransomware Awareness
PDF
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
PDF
Symantec's Internet Security Threat Report for the Government Sector
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
11 Reasons Why Your Company Could Be In Danger
PDF
RSA Monthly Online Fraud Report -- February 2014
 
PDF
Istr number 23 internet security threat repor 2018 symantec
PDF
Watch Guard Reputation Enabled Defense (White Paper)Dna
PDF
Product Innovation Award 2009
PDF
Comilion introduction presentation 26102012 (1)
PDF
How to tell if that pop-up window is offering you a rogue anti-malware product
PDF
Why Passwords are not strong enough
 
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
Infosecurity 2012 Banja Luka
Cisco Content Security
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
Enabling a Zero Trust strategy for SMS
2012 nq mobile_security_report
Data security for healthcare industry
Security Minded - Ransomware Awareness
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Symantec's Internet Security Threat Report for the Government Sector
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Top 5 Cybersecurity Threats in Retail Industry
11 Reasons Why Your Company Could Be In Danger
RSA Monthly Online Fraud Report -- February 2014
 
Istr number 23 internet security threat repor 2018 symantec
Watch Guard Reputation Enabled Defense (White Paper)Dna
Product Innovation Award 2009
Comilion introduction presentation 26102012 (1)
How to tell if that pop-up window is offering you a rogue anti-malware product
Why Passwords are not strong enough
 
Taking Control of the Digital and Mobile User Authentication Challenge
 
Ad

Viewers also liked (8)

DOCX
Hybrid venture That Is Lowering Angel's Risks
PPTX
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
PPT
PrePatent Auction eng
PDF
Final startup for startups
PPTX
Tieto ja viestintäteknologiaan
PPTX
Tepe uusi kalvopohja
PPTX
London walks 2011
DOCX
Hybrid venture That Is Lowering Angel's Risks
Hybrid venture That Is Lowering Angel's Risks
Tutkijatapaaminen työkalu tvt-kehitystyön kehittämiseen ja tutkimukseen
PrePatent Auction eng
Final startup for startups
Tieto ja viestintäteknologiaan
Tepe uusi kalvopohja
London walks 2011
Hybrid venture That Is Lowering Angel's Risks
Ad

Similar to GateWall DNS Filter (20)

PPTX
What is the Cybersecurity plan for tomorrow?
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Cyber Security 101
PPTX
Cyber security fundamentals
PDF
Centrify rethink security brochure
PPTX
Cyber security fundamentals (Cantonese)
PDF
SafeDNS Solutions for Internet and Mobile Service Providers
PPTX
Analytical Driven Security - Chip Copper
PDF
5 network-security-threats
PPT
Web Security and Network Security
PDF
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
PPTX
supply chain management.pptx
PDF
גיא אילון Websense
PDF
Information Security Risk Management
PDF
New Security Challenges Juan Miguel Velasco
PDF
New Security Challenges Juan Miguel Velasco
PDF
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
PDF
Cisco 2014 Midyear Security Report
PDF
Incapsula: Boosting Drupal Websites Security
PDF
Incapsula: Boosting Joomla Website Security
What is the Cybersecurity plan for tomorrow?
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Cyber Security 101
Cyber security fundamentals
Centrify rethink security brochure
Cyber security fundamentals (Cantonese)
SafeDNS Solutions for Internet and Mobile Service Providers
Analytical Driven Security - Chip Copper
5 network-security-threats
Web Security and Network Security
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
supply chain management.pptx
גיא אילון Websense
Information Security Risk Management
New Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Cisco 2014 Midyear Security Report
Incapsula: Boosting Drupal Websites Security
Incapsula: Boosting Joomla Website Security

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Machine Learning_overview_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Heart disease approach using modified random forest and particle swarm optimi...
NewMind AI Weekly Chronicles - August'25-Week II
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Network Security Unit 5.pdf for BCA BBA.
A comparative study of natural language inference in Swahili using monolingua...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine Learning_overview_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cloud_computing_Infrastucture_as_cloud_p
Reach Out and Touch Someone: Haptics and Empathic Computing

GateWall DNS Filter

  • 2. SECURITY ISSUES  Over 90% of viruses infect your machine via the Internet  The number of infected websites keeps growing  The number of new websites grows exponentially The growing popularity of social network brought new types of fraud designed to obtain t a victim’s personal information. It is often difficult to distinguish a phishing website from a normal site.
  • 3. ENTENSYS DATABASE VS FREEWARE ANALOGS Blocking websites that contain phishing links, Trojans, keyloggers, botnets and malicious software  Some 100,000 3,280,000 new websites are added daily  Information on malware websites comes 5,035,000 from multiple 322,000 sources Google Safe Browsing API UserGate DNS Filtering DB Known malware websites Известные сайты с malware Сайты reputation websites Poor с низкой репутацией
  • 4. DYNAMIC APPROACH BENEFITS PORN SITE CREATION EXAMPLE: 1. Create a website about butterflies 2. Classify the website as an educational page about animals (dynamics and statics) 3. Replace content with pornography 4. With static approach, the site will be categorized as a site about animals 5. With dynamic approach, its category will be changed to Porno DYNAMIC APPROACH STATIC APPROACH  Some 100,000 websites get modified  Category updates are rare every day  As a rule, the update process is  Information on malware websites launched manually comes from multiple sources  Database contains around 500 million websites  Database is kept constantly updated
  • 5. EMPLOYEE EFFICIENCY  24% of the sites that office employees visit are social network sites  Around 55% of website requests are not related to their work  The main goal of a social network is to make a user spends as much time as possible on the website Companies with 20 to 100 employees show the highest percentage of unwarranted Internet usage. HOWEVER, such primitive restrictions as keyword blocking or black and white lists may have a negative effect on employees’ performance.
  • 6. GATEWALL DNS FILTER – THE SOLUTION  Uses SaaS model (Software-as-a-Service)  Filters websites (500 mln URL database)  Protects from malicious software  Generates Internet usage reports and statistics  Internet usage monitoring  Increased Internet security  Less unwanted traffic  Better employee performance
  • 8. HOW DOES IT WORK?  Denial by categories (82 categories with 500 mln websites)  Black and white lists  White list inclusion request web-form  Website category modification request web-form  Advanced fail-safety  Web statistics (reports)
  • 9. BLOCKING URL CATEGORIES An administrator may easily configure the application to block sites belonging to the following categories:  Porn sites  Social networks  Malware websites  Torrents and P2P networks  Online gambling sites  Gaming and entertainment portals  Proxy servers and anonymizers
  • 10. CUSTOMIZABLE BLACK AND WHITE LISTS Some websites are blocked White lists guarantee access regardless of other network to certain websites settings
  • 11. REPORTS  Statistics by hits and categories  Lists of blocked websites
  • 12. POTENTIAL USERS PUBLIC INSTITUTIONS SMALL- AND MIDSIZED  Schools BUSINESSES  Social insurance agencies  Banks  Tax inspectorate offices  Insurance companies  Municipal and regional  Mining companies administrations  Distribution networks  Etc. INTERNET SERVICE PROVIDERS GateWall DNS Filter:  Home networks A handy tool that allows Internet usage  Second-tier ISPs control in companies of any size and  Large ISPs companies with a spread out  Business centers infrastructure  * Individual approach to each ISP
  • 13. PUBLIC INSTITUTIONS  Schools and other  Social insurance agencies educational institutions  Retirement funds Internet access at schools is one of the Public Internet services priority tasks of governments in many Every year, many projects are countries. launched that involve different These projects in almost all cases technologies and require the use of the require Internet usage at schools to be Internet. Hence the requirement to monitored. control and secure Internet access.
  • 14. SMALL- AND MIDSIZED BUSINESSES  Proactive protection  Employee performance Allocation of Internet traffic by Websites from the most dangerous categories, time and date. Websites categories are blocked (Spyware, that are not related to work (including Malware, Adult, Porno, Social social networks, online gaming portals, Networks, etc.). Category listings are etc.) are blocked. This helps improve constantly updated. employee performance. Copyright © 2009 Entensys Corporation
  • 15. INSTALLATION AND INTEGRATION  Each project is reviewed individually  Compatible with Microsoft NLB (Network Load Balancing)  Flexible billing system (monthly or annual billing)  API for integration with ISP’s billing system  API for rules management from client account page  Integration assistance
  • 16. SIMPLE SOLUTION  Cloud-based model  GateWall DNS Filter does not require local installation of any hardware or software solutions  The program remembers the current network mapping, security settings and processes executed by all existing applications  URL database updates run in the background and do not interfere with the users’ work
  • 17. SOME ALTERNATIVES OpenDNS A solution for large- and midsized companies and schools (K-12 schools) WebSense Hosted Web Security One of the world’s top vendors of information security solutions
  • 18. ENTENSYS COMPANY  Founded in 2001  Offices in Moscow, Novosibirsk, Leipzig (Germany)  Staff: more than 40 employees  More details about the company and other products: http://www.entensys.com/ STRATEGIC PARTNERS Kaspersky Lab Panda BrightCloud Commtouch Russia Security USA Israel Spain