Inline Configuration

NetSpective’s inline bridge configuration allows for optimal filtering control with granular control by user group and content category of HTTPS content. The primary advantage of inline filtering is the ability to selectively decrypt content categories, for example, perform transparent TLS inspection on Google but not Bank XYZ.

More

How the Inline Configuration Works

With a Inline Bridge configuration, the appliance provides all the functionality of the passive architecture with the added benefit on selective HTTPS inspection. Where competitive solutions slow network traffic, the Inline Bridge option extends control to the administrators to decrypt Google and Facebook but not financial sites where legal liability topic exist. The Inline Bridge edition supports both Fail OPEN and Fail CLOSED configurations, as well as, hot spare fail-over scenarios for redundancy.

Passive Configuration

NetSpective’s passive configuration allows for optimal filtering performance with zero traffic latency issues in even the highest of bandwidth environments. The primary advantage of passive filtering is wire-speed filtering. This is idea for educational service providers.

More

How the Passive Configuration Works

With a Passive configuration, the appliance sits off the SPAN or Mirror port of a switch. This allows the NetSpective appliance to monitor all requests to the internet. Since the appliance is not inline, it is not a point of failure on the network and does not introduce any added latency. The passive configuration also supports multi-appliance load balancing and hot spare fail-over scenarios for redundancy.

Proxy Configuration

The proxy’s inline filtering can deliver traffic shaping capabilities to assist in guaranteed bandwidth allocation to high priority sites and mission critical content.

More

How the Proxy Configuration Works

In addition to web filtering, NetSpective traffic shaping optimizes service for high priority applications while providing flexible control over non-essential, resource-intensive and undesirable traffic. Traffic shaping allows scheduling of communication streams into different classes of service with bandwidth limits and priorities. Control can be extended by group policy and Internet category allowing the flexibility to block, log, or prioritize traffic.

Mobile Proxy

Extend the same on-network filtering capabilities to devices that are used off-network while eliminating the need for repetitive authentication. Ideal for Chomebooks, iPads or Android mobile devices.

More
Global Proxy

How the Mobile Proxy Works

As a separate appliance that scales independently, the NetSpective Mobile Proxy is capable of filtering any device on or off the network. Devices such as iPads and Chromebooks that suspend applications or revert their image when restarted cannot be filtered with traditional agents. The Global Proxy can direct all traffic these devices generate back onto the network to ensure that school or business owned devices are filtered at home.

Cloud Service

Leverage the performance and features of enterprise-class internet content filtering with out the need for local hardware.

More

How the Cloud Service Works

As a Software as a Service offering, NetSpective is capable of filtering and reporting on both on-network and off-network traffic. Remote Agents are installed at the socket level in Windows and Mac operating systems allowing them to protect and log all user Internet activity. Remote Agents are also password protected and provide a complete audit trail of all internet activity.