* Fix for memory leaks in trusted ca load functionality.
* Integrated latest webfiltering engine.
"Ignorance is bliss, and most people accept this false sense of security"
The management of any enterprise must ensure optimal utilization of every available resource for itself.
In most organizations today, Internet access is an established resource. It's availability needs to be ensured for the important business activities, and proper steps need to be taken to control it's access.
Unless there is an active and accepted Corporate Internet Access Policy, the enterprise will remain vulnerable to:
And any of these losses can transform into the either of the other two, and eventually cascade into recurring Financial Losses.
Such a set of carefully validated reasons, are also termed as - acceptable applications. The validity of reasons that define an acceptable application, generally depend upon the following parameters:
Adherence to a well-defined list of such acceptable applications must be made mandatory, and may be declared in the Corporate Internet Access Policy.
Alternatively, an enterprise may choose to define unacceptable applications.
The validity of reasons that define an unacceptable application would be simply a negated list based on the above mentioned parameters.
SafeSquid® has a huge array of features to:
SafeSquid® has a unique profile based configuration system.
These profiles can be very easily used to enforce, the Corporate Internet Access Policy, that:
SafeSquid®'s web-interface gives you a quick view of statistical data, that tells you about the overall performance of the system.
It also displays the various activities, such as who's trying to fetch or Post content to which web-site in real-time.
SafeSquid® simultaneously generates logs in three unique formats. One, that tells you - the complete details about each activity, in FireWall style logs.
The access log is useable, with a variety of third-party log-analyzers, and tells you very clearly about the Internet access and usage pattern of every individual user.
The extended log records maximum details of each request handled by the proxy application.