DynaComm's i:series offers a range of security solutions: DynaComm i:filter is designed to monitor and protect you from internet traffic. Covering HTTP, HTTPS, FTP and NNTP traffic, it uses a database of URLs and a rules-based strategy to enforce your internet policy.
DynaComm i:filter consists of three components. The network monitor, which runs on a Windows NT/2000 platform, is the enforcement module. Once it is configured, it will check all destination URLs against the destinations database. This is an automatically updated and customizable blacklist of over six million web sites, classified into categories and maintained by FutureSoft.
The monitor uses packet-sampling to inspect all internet traffic, and will only grant a request if it comes from a permitted address or user/group, conforms to the rules that have been set for that user or group, and is not one of the blacklisted destinations.
The central database is built from three other databases: the destinations database; the admin database, which contains all configuration information for the network monitors, such as the rules and which addresses to monitor; and the log, which holds all the information returned from the network monitor.
The final component is the management console. Through this, all network monitors can be configured, users and user groups defined, and scheduling and rule sets specified.
Rules are grouped into rule sets. You specify which users or groups the rule set applies to, and the priority in which the rules are to be tested against them. If a rule is matched, alerts can be sent.
DynaComm i:filter is extremely flexible; because of its component nature, it can be scaled from a branch office installation to a globally distributed network. Installation does require some forethought, but once you have decided on the configuration it is very straightforward to install.
Documentation is extensive, in hard copy, online and PDF formats. In addition, FutureSoft offers excellent support.
DynaComm i:filter is a very powerful application, and its component architecture makes it ideal for companies with complex networks. Perhaps the only drawback is that you have to provide your own anti-virus product.