Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

NetSweeper

A complete solution deployed in the cloud or on-premise, with carrier-grade performance and reliability

Dynamic Categorization
Netsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a database of categorized sites maintained on the Netsweeper Category Name Server (CNS). Each URL is categorized by Netsweeper, and based on these categories, URLs can be allowed or denied in real-time without human intervention – at scale.

Logging and Reporting
We generate reports for you that are easy to understand, giving you the power to review Internet usage on your network. The data from our reporting services provides insight into network traffic or information on specific requests, websites, or users. The high-performance reporter can gather requests based on specified criteria and sort them, calculate statistics, and present results in tables and charts.

HTTPS Selective Filtering - NSProxy
Our advanced NSProxy service capable of delivering 10Gbps of throughput and up to 6Gbps of selective SSL decryption throughput. This service becomes more crucial as more and more of the internet is becoming SSL driven. Netsweeper can also filter HTTPS and filter by hostname without breaking encryption. Advanced social media SSL protection is an example of how our technologies are helping in today’s digital world. With NSProxy, we can allow access to the safe areas of social media, while restricting access to the potentially dangerous ones.

BYOD
With organizations across the world becoming increasingly dependent on mobile communication and work habits, security for all devices has become paramount. Thankfully, our solutions support the new BYOD trend, allowing any device connected to a Wi-Fi network to be filtered and secure. In addition, no software installs are required on your devices, as filtering takes place using the device IP address.

Authentication & Integration
Authentication is crucial to allow access to content for authorized users such as teachers, and restrict or block access to content for unauthorized users such as students. We offer Authentication Redirect features that empower you to authenticate users, ultimately placing them in different groups based on their authentication for a seamless online experience.

Social Media Controls
Social media can be a powerful communication tool, however, in certain scenarios it can also be detrimental to the activity at hand. Social media controls can be used in the office or at home during a child’s schoolwork time. Time segments can be used to block social media at certain points in the day, or all together on a given network. We help you become more productive when you need to be with our effective social media controls.

Policy Service
A filtering policy is a set of rules or settings that the Netsweeper Policy Service uses in making decisions about whether

Rating
5521reviews
2 votes
Favoured:
0

Listing Details

Vendor
NetSweeper, Inc.
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-03-31
Owner
michelemjordan
Created
2008-08-03
  • 1089.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
    • - DLP Network
    • - Anti Spam Gateways
    • - Data Diodes
    • - Enterprise Appliance FW
    • - Enterprise Software FW
    • - SOHO Appliance FW
    • - Guards Mail
    • - Guards XML
    • - Guards Web
    • - Guards Net Mgmt
    • - Guards File Transfer
    • - Guards Authentication
    • - DDoS Mitigation
    • - IPS Evasion
    • - IPS Network
    • - Network Taps
    • - Load Balancers
    • - FW Mgmt and Test
    • - Firewall Next Generation
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message