{"id":5732,"date":"2021-09-07T22:24:52","date_gmt":"2021-09-07T22:24:52","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5732"},"modified":"2021-09-07T22:32:27","modified_gmt":"2021-09-07T22:32:27","slug":"web-filtering","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5732","title":{"rendered":"Web Filtering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5732\" class=\"elementor elementor-5732\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4199e1a4 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4199e1a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7860dfff ot-flex-column-vertical\" data-id=\"7860dfff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2261fd19 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"2261fd19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-17818a83 ot-flex-column-vertical\" data-id=\"17818a83\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56759418 elementor-widget elementor-widget-iheading\" data-id=\"56759418\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ WEB FILTERING<\/span>\r\n\t        <h2 class=\"main-heading\">It\u2019s A Jungle Out There.<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2f0bf23 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"2f0bf23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6a09f9a4 ot-flex-column-vertical\" data-id=\"6a09f9a4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b85a03c elementor-widget elementor-widget-text-editor\" data-id=\"6b85a03c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Software as a Service is Changing the Rules<\/strong><\/h4><p><strong>Web security used to be simple. Block offensive DataSecure and viruses and everything else is a HR and management issue. Unfortunately, with Software as a Service (SaaS) being attractive to workers and business unit managers, IT and risk personnel need to be equally concerned about what is leaving the network through the web, in addition to what is entering.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-488b5ea elementor-widget elementor-widget-spacer\" data-id=\"488b5ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae76d70 elementor-widget elementor-widget-text-editor\" data-id=\"ae76d70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An added concern is that web is now the preferred channel for criminals to conduct attacks, deliver malware. Today, exfiltrating data and web filtering is no longer the simple proxy-with-filtering it used to be.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b791f99 elementor-widget elementor-widget-spacer\" data-id=\"b791f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-849ed2c elementor-widget elementor-widget-image\" data-id=\"849ed2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"430\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-1024x430.png\" class=\"attachment-large size-large wp-image-2565\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-1024x430.png 1024w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-300x126.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-768x323.png 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-1536x645.png 1536w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242-720x303.png 720w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/webfiltering-e1567602631242.png 1873w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78e4335 elementor-widget elementor-widget-spacer\" data-id=\"78e4335\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5fa44f elementor-widget elementor-widget-text-editor\" data-id=\"d5fa44f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An added concern is that web is now the preferred channel for criminals to conduct attacks, deliver malware. Today, exfiltrating data and web filtering is no longer the simple proxy-with-filtering it used to be.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2566 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/products-content-img-11-e1567604527202.jpg\" alt=\"\" width=\"610\" height=\"382\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/products-content-img-11-e1567604527202.jpg 610w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/products-content-img-11-e1567604527202-300x188.jpg 300w\" sizes=\"(max-width: 610px) 100vw, 610px\" \/>\u2022 Detect custom malware while being able to assess downloaded files quickly. End users will not tolerate a long wait while their file is sandboxed. Whitelists, file reputation, certificate checking and other ways of safely approving of a file needs to improve the end user experience<br \/>\u2022 Detect and manage Software as a Service usage, allowing IT and Risk managers to see when a new SaaS application has been adopted without the permission or knowledge of IT staff. This can also be employed by implementing a separate cloud access security broker which can automatically ingest logs from your existing proxy<br \/>\u2022 Detect and manage end user behavior. A relatively new field but an increasingly important one, User Behavior Analytics or UBA, watches users for unusual behaviors which may indicate that they have been compromised or are disgruntled. For example, a sales person who normally only accesses a dozen records a day, mostly his own, suddenly starts accessing 5 records per second across all team members, may be copying off the database to move employers, or could have been compromised.<br \/>As the lines between \u2018internal network\u2019 and \u2018external network\u2019 starts blurring, Web Filtering and Cloud Access Security Brokers will become increasingly important. Maintaining control over your information can only be achieved by having a thorough and accurate understanding of how web applications are used by your staff.<\/p><p>Contact DataSecure to find out how we can help you control web usage and keep your data and IP safe and secure<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17516337 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17516337\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a259672 ot-flex-column-vertical\" data-id=\"4a259672\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98c21ad elementor-widget elementor-widget-heading\" data-id=\"98c21ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7821001 elementor-widget elementor-widget-heading\" data-id=\"7821001\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dc4239e elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"1dc4239e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ WEB FILTERING It\u2019s A Jungle Out There. Software as a Service is Changing the Rules Web security used to be simple. Block offensive DataSecure and viruses and everything else is a HR and management issue. Unfortunately, with Software as a Service (SaaS) being attractive to workers and business unit managers, IT and risk personnel [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5732","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5732"}],"version-history":[{"count":5,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5732\/revisions"}],"predecessor-version":[{"id":5738,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5732\/revisions\/5738"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}