New Features of SearchInform NetworkSniffer: Blocking Outgoing HTTP(S) Traffic
03.03.2016
SearchInform released a new version of the platform for capturing data by mirroring traffic: now the system allows you to block outbound HTTP(S) traffic according to the specified rules. Previously, NetworkSniffer captured wrongful actions of users, and now the administrator can prevent them. The updated product allows you to configure individual rules of blocking, adapting them to the specific application tasks: various options and logical operators are available. All traffic passing through the proxy server is sent to SearchInform NetworkSniffer for inspection. If the traffic does not fall under the security policy, it will be allowed and if it contains violations – it will be blocked. Rules of blocking allow you to customise the system to any need – from limiting access to restricted resources to blocking confidential texts transmission. System users are not limited in any way while creating rules of blocking – one rule can contain one simple condition, as well as hundreds of different ones. Updated SearchInform NetworkSniffer will:
  • Limit the use of restricted resources. New features can be used not only for security but also for improvement of labor discipline. Staff will not be able to attend entertainment web sites, so work flow productivity will improve.
  • Block unwanted traffic on any device, regardless of operating system. The component works at the network layer, so it doesn’t matter what device and OSs employees use.
  • Work with the encrypted traffic. Blocking is possible due to a proxy server that supports ICAP protocol. It doesn’t matter if user traffic is encrypted or not: the application enables both interception and blocking of violations regardless encryption.
Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.