Network Security?

Network security for a corporate network is a critical IT function that can save money in network performance, employee productivity and infrastructure cost overruns. A network monitoring system monitors an internal network for problems. It can find and help resolve snail-paced webpage downloads, lost-in-space e-mail, questionable user activity and file delivery caused by overloaded, crashed servers, dicey network connections or other devices.
The practise of network security is simillar as practises below:-


Door Access Card - The practice of installing electronic access control systems began in the 1960s to reduce the problems associated with lost keys, having the ability to instantly add, allow, restrict or deny someone’s access, and to be able to immediately generate an activity report on people’s “entering and exiting.”

Closed-Circuit Television (CCTV) - The first commercial closed-circuit television system became available in 1949. It's is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores. It reduces crime, used in industrial processes, traffic monitoring, transport safety, control of retail.

Call Tracking Software - records what number has called, the geographical location of a caller (if available), the time distribution of incoming calls and some may record the phone conversation.

 

Why Network Surveillance?

 

Avoid Legal Trouble (Crime Prevention)

It might be hard to believe but the above stats show it to be true: The most common form of employee misuse of the Internet is to surf porn. Did you know a co-worker overseeing this misuse and becoming offended can result in legal action against the company? You don’t have to be imaginative to consider the costs of such a lawsuit. 

 

Traffic Monitoring

Most of us don’t really understand how data flows to and from our computer networks. We make use of it, but we don’t truly know how it works. So when we see our computer applications slowing down, most of us get frustrated. Then we assume our IT infrastructure is old and outdated and must need replacing. That’s an expensive proposition though, and quite possibly incorrect. Maybe all you need is a set of tools to manage bandwidth usage…at a fraction of what a major upgrade costs.

 

Control

Without a Network Security, you are letting your employees waste time surfing for things that have nothing to do with your business. How much?

    30 – 40% of Internet use at work is not related to business (IDC Research)
    Over 60% of all online purchases are made between 9AM and 5PM (Nielsens/NetRatings)
    70% of all Internet porn traffic occurs during the 9-5 workday (SexTracker)
    37% of workers say they surf the Web constantly while at work (Vault.com).

These are independent statistics, and they show that employees are spending a large amount of time looking at things on the Internet that they shouldn’t be.

Let’s say you have three employees, who earn an average of $20 per hour and work an 8-hour day Monday through Friday. Let’s assume that, with effective Electronic Surveillance in place, you recover just 15 minutes of productive time a day from each employee. Just 15 minutes a day each. Much less than one percent of a 40-hour work week. Doesn’t sound like much, does it? However, you just made $300 in labour costs per month productive again–you just saved $300 per month from being wasted! That’s $3,600 in a year!

 

Safety

With the start of Web 2.0 technologies, websites are now mash-ups of content that is aggregated from many other sites. This scenario adds complexity to filtering websites based on domain names alone and also opens up new avenues of attack for hackers and virus writers who are becoming increasingly successful at compromising syndicated feeds. If just one feed of data is compromised, all the websites that pull in that feed will deliver malicious code to their trusted users.

An effective network security will judge incoming web data based on its content and not its source alone. Malicious content that is smuggled into trusted sites will still be detected and filtered out, thus protecting the internal network.

 

the Technologies

 

 

DansGuardian is an award winning web content filtering proxy for Linux, FreeBSD/OpenBSD/NetBSD, Mac OS X, HP-UX, and Solaris that uses a web proxy such as Squid to do all the fetching.

   

 

 

Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages.

   

 

 

Clam AntiVirus (ClamAV) is a free and open-source, cross-platform antivirus software tool-kit able to detect many types of malicious software, including viruses. One of its main uses is on mail servers as a server-side email virus scanner. The application was developed for Unix and has third party versions available for AIX, BSD, HP-UX, Linux, OS X, OpenVMS, OSF (Tru64) and Solaris.

   

 

 

Zentyal is the control panel for DansGuardian, Squid, etc and operating under Ubuntu Server operating system.

   

 

 

Ubuntu is built on Debian's architecture and infrastructure, to provide Linux server, desktop, phone, tablet and TV operating systems.

 

Why TLC?

 

opensource
Open-Source

TLC Network Security system is typically a collaborative effort where programmers improve upon the source code and share the changes within the community so that other members can help improve it further. This symbolises our system is SAFE and RELIABLE!

Scalability

Our Network Security is able to increase its total output under an increased load when hardware are added!

 scalable
costeffective
Cost Effective

TLC Network Security allows clients to respond to ever-higher demands at the appropriate cost and keep IT costs low while being able to support all users with basic network services, no matter what operating system on clients' computers.