Our Products
Consulting:
We provide on-site or remote consultancy by the hour, day or annual retainer to meet your needs.
This covers all aspects of Internet content / network control for organisations, policy review and recommendations, closing the understanding gap between products and IT with leadership and policy, assisting with understanding and quantify risk, making sure Policies and implement technology match and are mapped to safeguarding needs and priorities etc.
Please email sales@internet-safeguarding.com with your details and requirements for a quote, queries or additional requirements.
Intelligence / Data feeds:
Annual subscription services for data feeds. These feeds are utilised by our customers to facilitate improved blocking or detection of VPN, Proxy, and other privacy application use. We also provide custom lists on requests to block or detect other applications.
The safeguarding bundle, typically deployed on firewalls to be used in the firewall policy to classify and block traffic related to VPN’s, proxies, Tor etc. that the firewall cannot by default.
Tiered licensing, by number of users for perimeter use, enabling deployment on HA firewalls or multiple Internet connections at no extra cost.
This product includes the following:
- Consolidated Destination IP list of commercial VPNs.
- Consolidated Destination IP list of anonymous and other proxies.
- Consolidated Destination IP list of Tor Nodes, ingest and exit.
- Consolidated list of DNS domains and queries to block.
- Consolidated list of URI’s to block.
- Custom list of IP addresses, domains and URIs to filter to block specific applications in request.
- Custom allow and block lists, API configurable to override or augment these lists for your environment.
- A Firewall configuration checklist.
In most cases, these lists can be downloaded automatically periodically to firewalls or gateways as part of the configuration of that device, income cases it may be necessary to provide some custom integration work to deploy these feeds effectively.
API services:
Annual subscription services, tiered by number of queries per month for the following data / intelligence feeds:
- IP address information, includes Geo location information1, Whois & AS data, basic classification.
- Enhanced IP address information, as above with advanced classification, including commercial VPN2 vendor source information.
- Individual commercial VPN vendor data sources, and bundles.
- Domain name information, basic classification.
- Domain name information, advanced classification.
Data Processing services:
Annual subscription services for:
- Firewall log processing real time or batch Layer 4 data only.
- Firewall log processing real time or batch Layer 4 & Layer 7 URI data.
- DNS request log processing real time or batch.
- Custom API feed of source IP’s based on detections in firewall data, real time or batch.
We receive and process this log data for VPN / Proxy / Tor activity, to a data repository and utilise advanced heuristics and years of experience providing safeguarding reports.
If the Layer 7 URI data contains firewall content classification and user data, we process that as well and can provide useful reports on usage and activity.
There is an initial setup charge for these products as we use dedicated secure cloud instances for this processing, insuring data isolation and residency / privacy requirements are met and to match scale of log data flows with resources cost effectively.
In some cases we may need to set up virtual server near your firewall infrastructure to ensure the data feed to us is adequately encrypted and secure.
Custom processing and report creation is possible but chargeable on a SoW basis.
‘One off’ processing of firewall data:
- Firewall log processing batch Layer 4 data only.
- Firewall log processing batch Layer 4 & Layer 7 URI data.
- DNS request log processing real time or batch.
We receive and process this data for VPN / Proxy / Tor activity, using a temporary private data repository and utilise advanced heuristics and years of experience providing safeguarding reports.
If the Layer 7 URI data contains firewall content classification and user data, we process that as well and can provide useful reports on usage and activity.
These log files must be securely transferred to us.
We can also provide user usage profiling to detect other classes of non compliant abuse.
Custom report creation is possible but chargeable.
Notes on our products:
- We create and maintain our own IP and intelligence data and Geo location data, utilising data from Internet registries, known locations and data centres, data organisations publish about their networks and locations , routing and BGP information and our own Internet topology graphing and mapping technology. This is not a resold solution from any of the “well known geo data” providers. ↩︎
- We create and maintain our own VPN and Proxy intelligence data, this far exceeds the accuracy and effectiveness other vendors data in our customer evaluations for accuracy and completeness, this is required for effective blocking of VPN and proxy activity, with a low risk of blocking legitimate traffic. ↩︎