Monitor and control web activity
Uncontrolled web activity can impact productivity, lead to malware infections, increase costs and potential legal liabilities, as well as a bruised company image. GFI WebMonitor delivers unique web filtering capabilities by combining application-based traffic filtering with a website categorization functionality. Together they allow accurate control over what users are doing online and the applications they are using.
Manage bandwidth and internet usage
Browsing websites like YouTube and spending time on social media sites like Facebook can take up a huge chunk of bandwidth. GFI WebMonitor’s bandwidth control capabilities help administrators manage how that bandwidth is utilized and, in turn, reduce costs. Intuitive dashboards give a clear, detailed picture of how much bandwidth goes into productive activities, and how much of it is wasted on fruitless browsing. Then take full control over how it should be used.
Secure downloads and web browsing
Protecting the network against web-based threats is a major challenge for IT and security admins. Ignoring the dangers of online activity can lead to malware infections or data breaches. As a result organizations could incur heavy costs, poor productivity, downtime, compromised business-critical information and increased IT costs to repair the damage. Don’t let your reputation be tarnished if you can prevent it. GFI WebMonitor scans downloads in real-time using up to 3 antivirus engines to ensure malware-free downloads.
Reduce time wasted by employees online through the granular management of their browsing habits.
Maximize available bandwidth
Set time and bandwidth thresholds, block streaming media, and gain via proxy caching.
Monitor HTTPS traffic
Protect against malware masking itself in HTTPS traffic, and block attempts to circumvent web filtering.
Reap financial rewards immediately by controlling employees’ Internet usage.
Proactively protect your network
Control downloadable file types, scan downloads using multiple antivirus engines and block known malicious sites.
Manage social media use
Facebook is one of the most popular sites on the whole internet, but is it where your employees should be?
Prevent data leakage
Block socially-engineered phishing websites and other online scams by controlling Internet access.
Filter internet use
Create and enforce an Internet usage policy to filter websites based on a list of over 280,000,000 domains.
Network traffic setup
- Two Network Interface Cards (for Gateway mode only)
- Router / gateway that supports traffic forwarding or port blocking (for Simple Proxy mode only)
- Processor: 2.0 GHz
- RAM: 4 GB
- Hard disk: 12 GB of available disk space
- Processor: 2.0 GHz (multi-core recommended)
- RAM: 8 GB
- Hard disk: 12 GB of available disk space
NOTE: Allocation of hard disk space depends on environment. The size specified is the minimum required to install and use GFI WebMonitor. The recommended size is between 150-250 GB.
Supported operating systems – server side
GFI WebMonitor can be installed on (x86/x64) versions of:
- Windows Server 2016
- Windows Server 2012 (including R2)
- Windows Server 2008 (including R2)
- Windows SBS 2011
- Windows SBS 2008
- Windows 10
- Windows 8/8.1
- Windows 7
- Windows Vista SP2 or higher
NOTE: Transparent Proxy mode can only be enabled on certain operating systems. Click here for more information.
Other required components - server side
- Microsoft Internet Explorer 10 or later, Mozilla Firefox (v31 or newer) or Google Chrome (v36 or newer) – for the main product console.
- Microsoft .NET Framework 4.5.2 or newer
- IMicrosoft IIS Express
- Routing and Remote Access service on Microsoft Windows Server (for Gateway mode only)
- Microsoft SQL Server Express 2005 or later
- Microsoft SQL Server 2005 or later (for reporting purposes)
Browse the GFI OneGuard knowledge base.
Monitoring the Web: It is all about security and nothing but security
Monitoring Web traffic within an organization is not only a major component of the security software and service architecture, but is also an important part of security policy. This white paper examines why organizations not only need to implement clear IT policy to support Web monitoring, they also need to reinforce this with clear training and communication.
Web security: 10 steps to effective web security
Achieving comprehensive Web Security is not a trivial task. The threat landscape of the Web is complex and ever evolving … and implementing mechanisms to mitigate threats coming from the various risks is a difficult task.
Web reputation: How it can help increase your online protection
Web Reputation is the latest method in use to boost protection against current to future malicious content on the web for those browsing the Internet. Using Web Reputation, websites are assessed for immediate and potential threats, malicious content and risky characteristics and a score (0 – 100) is given.
Internet use in SMBs: Towards a comprehensive internet security strategy for SMBs
Small and medium-sized businesses (SMBs) need a comprehensive Internet security strategy to be able to protect themselves from myriad web-based threats. Defining and implementing such a strategy requires proper preparation, a clear understanding of the technologies and methods that can be adopted, a good user-education program and a proactive approach to security.
GFI and FB Security Group does not do any form of refund. We encourage and highly recommend that you take advantage of their “Try before you buy” policy: Use the 30-day free trial period to thouroughly test and evaluate the product before purchasing.