Enquiry & Feedback

 

Our specialists are ready to help you with any enquiries and troubles you have. Please submit the form below with your contact, and we will respond to you promptly.

The fields indicated with an asterisk (*) are required to complete this enquiry; other fields are optional.

     
Name:*
 
Email Address: *
 
Phone: *
 
Fax:
 
Company:
 
Business Nature:
 
Job Title:
 
Please enter your feedback
or enquiry here: *
 
 

Shall we send you updates and promotions using above email?*

Yes       No

Home > Solutions & Services > Enterprises Solutions > Internet Access Management

Internet Access Management

In order that staff could gain the updated market information and communicate with external parties, company network should be the internet unceasingly. However, some staff made use of the network to visit illegal website, chat online and share resources via P2P tools illegally during office hours. The inappropriate usage of network caused the following problems:

(1) Addicted to instant messenger to chat with others and visit some websites which is unrelated to the job; and it lessens the working efficiency;
(2) Use company network to download document via BT or use P2P software, which greatly consume the limited bandwidth resources of the company;
(3) Be infected with virus and Trojan easily, which break down the whole network system
(4) Leak confidential information via email and MSN;
(5) Act illegal behavior in the internet, which causes loss of the company

All above problems could be resolved by IAM. IAM helps management team instantly get the detail information of network operation, analyze and discover the potential problems so as to guide them a right direction to resolve it. IAM, as the advanced internet access management solution within China, has the powerful functions and properties and can meet many requirements of the customer. It provides many identification modes for customers’ access, such as users’ name, IP-MAC binding, USB-KEY identification and the integrated identification by linking LDAP and Radius, which simplifies the deployment and offers the organization a strict identification pattern. It helps create a comprehensive and safe network environment for enterprises.


1.     Standardize Online Behavior (E.g. block MSN, You Tube & Online Game) in order to enhance working efficiency

It is quite common that staff do personal stuff during working hours. Management Team feels difficult to prohibit that they do something unrelated to the job, such as chat via MSN and play online game etc., which is negatively affect the productivity. However, IAM greatly reduces these kinds of behavior and concentrate staff on work.

2.      Control the Usage of Bandwidth
The usage of PSP software always occupies a high proportion of the bandwidth. To deal with this problem, IAM is definitely useful as it restricts the usage of bandwidth for specific online applications, like P2P software. Users can base on the group, time and applications to adjust the bandwidth for all online applications. It assures schools to maintain good bandwidth management and prevent abuse it.

3.      Improve the Security of Internal Network
It is a common problem that staff visits porn website or download unknown file which might induce virus and Trojan to attack the PC. However, the filtering function from IAM eliminates this problem.

4.      Avoid the Leak of Confidential Information
Staff might unconsciously leak confidential information when using online software to communicate with external parties. IAM provides rich functions to filer all the information sent out from the company, including email content and chat content from IM. It greatly reduces the possibility of leaking confidential information.

5.      Standardize Online Behavior and Reduce
Staff might make use of the internet resource from the company to do some illegal acts, such as downloading or issuing porn photos and videos, which cause their company to violate the law. IAM can create detail report about such behaviors from staff and prevent it.

Functions:


Field

Functions

Detail

Control

Obstruct dangerous website

Classify all website with any porn information and virus, and obstruct to visit it

Control strategy

Based on the group, time, services and content to restrict the website they browse

Obstruct P2P

Filer the content in all PSP software, such as MSN, SKYPE and BT

User Identification

Web login to identify the user

Control of document download/upload

Restrict the download/upload speed in http and ftp, and the file transferring speed in P2P software

Protect confidential information

Obstruct the confidential data via http, ftp, smtp, imap

Investigation

Email investigation

Email can only be send out after investigation

Instant control

Instantly control online behavior

Bandwidth control

Based on the usage of bandwidth from different users, protocol and time to conduct detailed analysis, and optimize the usage of internet resources

Management

Rights of Administration

Various management level and have different rights

Local and remote management

GUI

Backup

Use the encrypted document for system backup

Firmware upgrade

Gain updated version and functions via remote upgrade

Auto Recovery

Provide the function of auto recovery

Log

Log backup

Support auto backup

Data center

IAM provide data center for detailed analysis

Features

Internet port

PSTN/ISDN ADSL/xDSL Cable Modem DDN/ATM WLAN

Protocol

IPv4、IPv6

Network

WAN、DMZ、LAN

Copyright 2012© ICT Technologies & Services Limited. All right reserved.