If the objective is to restrict blogging activity, network-monitoring software probably isn't the most efficient...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
way to do so. I'd recommend implementing a content-filtering product, such as Secure Computing Corp.'s Webwasher SME250 or Websense Inc.'s Hosted Web Security tool. These products come with built-in Web categorization databases that help monitor certain types of unwanted traffic, such as blogging sites, pornography, etc.
If you choose to implement content filtering, a word of warning: no filtering scheme is perfect, and it's difficult to defeat someone who is determined to bypass such filtering. For example, if you allow users to access secure websites using HTTPS, it won't be possible to inspect the contents of their encrypted traffic. Bypassers could set up an encrypted proxy at home and use it to route traffic elsewhere on the Internet. Also, while content filtering databases may contain well-known blogging sites, such as Blogger and Wordpress, they can't possibly track all of the little-known single blog sites out there on the Internet. You can build a wall if you like, but it's going to be made of Swiss cheese.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Mike Chapple
Are nonprofit organizations, like higher education institutions, subject to FTC cybersecurity regulations and oversight? Expert Mike Chapple explains.continue reading
It's important for healthcare organizations to have a clear social media policy. Expert Mike Chapple explains what needs to be in the policy to stay ...continue reading
SOC 2 evaluations can be helpful tools for organizations assessing their HIPAA compliance, but companies should not solely rely on them. Compliance ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.