Control who can surf where.

Specify which websites employees have access to by using Astaro URL Filtering. Casual surfing wastes time and some sites can contain unwanted and inappropriate images, videos, or content. Spyware and malware can be blocked before they are allowed to be installed, thus saving even more time and administrator overhead in keeping the machines clean and running smoothly.

 

Descriptions & Screenshots URL Filtering

Using Astaro’s URL Filtering, companies control Web Security by blocking and allowing everything from an entire category type to a single URL. The reporting will show who visited what site, when, and how many times, along with bandwidth statistics that allow you to identify excessive or inappropriate usage.

Astaro URL Filtering is designed to provide many benefits without a confusing setup procedure. Just enable the filter and then choose the material you wish to block along with who should fall under this set of restrictions. You can create multiple profiles and assign them to different things; such as putting the guest wireless LAN under heavy restrictions while the in-house employee machines enjoy a more relaxed profile.

With over 95 classification categories, you have complete control over what is allowed to be accessed, by whom, and when. Combined with a directory authentication resource like Active Directory, policies can be built for existing users and groups, while detailed reports outline how effective the policy has been and if adjustments need to be made. Buckets can be used to combine multiple categories into a single profile, so that time isn’t wasted in building additional security policies.

 


 

Available Platforms

Astaro Security Gateway Hardware Appliances

Astaro Security Gateway Hardware Appliances

Our hardware appliances are purpose built, high-performance security devices. They integrate Astaro’s security applications with a hardened Operating System on optimized Intel-compatible server systems that cater to every business size. This section details the series of Astaro Security Gateway hardware models available.

Astaro Security Gateway Software Appliance

Astaro Security Gateway Software Appliance

Our software appliances include the operating system and all security applications bundled within a single software image. While offering the same capabilities as the hardware platform, they can be easily installed on your hardware of choice – maximizing deployment flexibility. The Astaro Security Gateway software appliances are much easier and faster to set-up than software applications that require the installation of an operating system in advance.This section details the security applications available, technical information and deployment scenarios.p

Astaro Security Gateway Virtual Appliance for VMware

Astaro Security Gateway Virtual Appliance for VMware

Our virtual appliances include a software appliance which has already been pre-installed and pre-configured for VMware environments. Being the first unified threat management product that has been certified as “VMware Ready”, it allows for the secure and easy deployment of an "all-in-one" security solution within a virtual environment. This section details the security applications available, technical information and deployment scenarios.

 


 

Technical Information

Astaro’s powerful URL Filtering technology enables IT administrators to effectively control employee’s web access to more than 3.8 billion web pages allowing enforcement of company wide web surfing policy.

  • Comprehensive Up-to-Date Database with 35+ Million Websites Covering over 3.9 Billion Web Pages in 96 Categories:
    • Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc.
    • Additional categories can be created for individual customization
    • International content from hundreds of countries in 65 languages
    • Re-categorization via online form
  • Fast Response Times through Globally Distributed Database Replications
  • Filter Might also Consider Global Reputation
  • Whitelists and Blacklists to Tailor Access for Groups of Users
  • Many User Authentication Options
    • IP Address, Active Directory SSO, eDirectory SSO, LDAP, RADIUS/TACACS+
    • Time-based access policies