Netsentron
Encyclopedia
NetSentron is a network security appliance designed and sold by Kobelt Development Inc. (KDI), a Surrey, British Columbia
Surrey, British Columbia
Surrey is a city in the province of British Columbia, Canada. It is a member municipality of Metro Vancouver, the governing body of the Greater Vancouver Regional District...

-based IT services
Information technology
Information technology is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications...

 company. The NetSentron appliance is a firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, Website content filter, and Virtual Private Network/remote access device—often referred to as a unified threat management
Unified threat management
Unified Threat Management is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations...

 product.

History

NetSentron was privately developed by KDI in 2002. The product is available both as a hardware appliance and software which must be loaded onto equivalent hardware. The initial target market was business
Business
A business is an organization engaged in the trade of goods, services, or both to consumers. Businesses are predominant in capitalist economies, where most of them are privately owned and administered to earn profit to increase the wealth of their owners. Businesses may also be not-for-profit...

es, to provide ultra-high security data transfer with its AES
Advanced Encryption Standard
Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...

-256 bit encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

. When using the NetSentron to securely transfer data between two or more locations the data is protected at a level approved of for moving US Top Secret-rated data
NSA encryption systems
The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems has become known and its most modern systems share at least...

. Over time, however, school
School
A school is an institution designed for the teaching of students under the direction of teachers. Most countries have systems of formal education, which is commonly compulsory. In these systems, students progress through a series of schools...

s wanting to protect their students from being exposed to inappropriate Internet content (as defined by individual school administrators: examples include pornography
Internet pornography
Internet pornography is pornography that is distributed by means of various sectors of the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups...

, hate, gambling
Online gambling
Online gambling, also known as Internet gambling and iGambling, is a general term for gambling using the Internet.-Online poker:Online poker tables commonly offer Texas hold 'em, Omaha, Seven-card stud, razz, HORSE and other game types in both tournament and ring game structures...

, Instant Messaging
Instant messaging
Instant Messaging is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet...

 and music download
Music download
A music download is the transferral of music from an Internet-facing computer or website to a user's local computer. This term encompasses both legal downloads and downloads of copyright material without permission or payment...

 sites) became interested in the NetSentron because of the appliance's true content filter. Update patches are periodically released.

Features

The NetSentron provides many features for network security
Network security
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...

 and management
Network management
Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems....

. These include:
  • Firewall
    Firewall (computing)
    A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

     with Intrusion Detection System
    Intrusion detection
    In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. When Intrusion detection takes a preventive measure without direct human intervention, then it becomes an Intrusion-prevention...

  • Virtual Private Network
    Virtual private network
    A virtual private network is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network....

     / remote access
    Remote access
    In telecommunication, the term remote access has the following meanings:#Pertaining to communication with a data processing facility from a remote location or facility through a data link...

     with AES
    Advanced Encryption Standard
    Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...

    -256 bit encryption
    Encryption
    In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

  • True Content Filter
  • Bandwidth Monitoring
    Bandwidth management
    Bandwidth management is the process of measuring and controlling the communications on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network.- Management :Bandwidth management mechanisms may be...

  • Traffic Shaping
    Traffic shaping
    Traffic shaping is the control of computer network traffic in order to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds of packets that meet certain criteria...

  • Popup Blocker
    Pop-up ad
    Pop-up ads or pop-ups are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements...

  • Spam Filter
    E-mail filtering
    Email filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to outgoing emails as well...



The NetSentron hardware appliance is available in two sizes. The original is a 1U server rack, configurable for supporting up to 200, 400 or 800 concurrent Internet users depending on the option purchased. For smaller operations, a Small Form Factor supports up to 50 concurrent Internet users.

The true content filter uses both a traditional Blacklist
Blacklist
A blacklist is a list or register of entities who, for one reason or another, are being denied a particular privilege, service, mobility, access or recognition. As a verb, to blacklist can mean to deny someone work in a particular field, or to ostracize a person from a certain social circle...

 together with algorithm
Algorithm
In mathematics and computer science, an algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function. Algorithms are used for calculation, data processing, and automated reasoning...

ic methodology to review the content of websites the Internet user wishes to view against administrator-entered words and phrases. If inappropriate content is discovered, the user is blocked from viewing the site. The administrator can turn the true content filter off, or set the sensitivity at any level all the way up to Whitelist Web access only. Categories of access can also be set for different user groups (eg. students & teachers, employees and managers).
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK