Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/17/2010
08:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OpenDNS Adds New Web Filtering Feature

Block Page Bypass allows for individual or department-level filtering settings and bypass functionality

Feb 16, 2010 — San Francisco, CA -- OpenDNS, provider of the world's leading Internet navigation and security services that make networks safer, faster, smarter and more reliable, today introduced Block Page Bypass, a new feature of its industry-leading cloud-based Web content filtering service designed to deliver more granular filtering control and power in the most efficient way possible. The announcement is significant as it eliminates a final remaining hurdle for global enterprises, large school districts and other organizations with per-user filtering, per-department filtering or filter-override needs for making the switch to OpenDNS Enterprise.

The much-anticipated Block Page Bypass feature works by empowering the network administrator or OpenDNS Enterprise account manager to assign individuals permission to bypass network-wide blocks and access designated Web sites. This highly effective and efficient method of granting access on a per-user basis does not require proxying of all Web sites, which is a weakness among appliance-based filtering products and services as it generally slows down network speeds. In contrast, OpenDNS Enterprise works by proxying only sites being bypassed.

Block Page Bypass hits a sweet spot with organizations that have the simple need of providing uninhibited Internet access to management while limiting access for the rest of the company. Also for organizations needing to provide different levels of access to different departments " such as HR and marketing being allowed to visit social networks like Facebook.com, while restricting access for customer support " but that don't want to deploy and manage costly appliances to accomplish the straightforward task. Additionally, OpenDNS is seeing heightening demand from organizations looking to reduce costs enterprise-wide, and finding that OpenDNS Enterprise with Block Page Bypass meets all of their Web content filtering needs.

Click here [http://www.opendns.com/solutions/business/filtering/#bpb] for help understanding if Block Page Bypass will meet your needs.

OpenDNS Enterprise was delivered in response to customer demand for a better performing and more cost-effective Web content filtering solution than what was previously available via a pricey appliance. OpenDNS Enterprise removes both the complexity and the cost of managing Web content filtering: the total cost of ownership for OpenDNS Enterprise is a small fraction of what hardware, services and fees for Websense and Blue Coat cost.

"Since the wildly successful launch of OpenDNS Enterprise late last year, we've heard growing demand for a function that allows customers to assign filtering preferences on a per-user basis. It became very clear that this was something we needed to deliver, but the standard way this is accomplished by appliance vendors like Websense and Blue Coat is completely inefficient. What we present proudly today is significantly more intelligent, and no less than what you've come to expect from OpenDNS," said David Ulevitch, CEO of OpenDNS. "I personally encourage any company still paying for Websense or Blue Coat to give OpenDNS Enterprise a good look now that one of the final remaining hurdles to switching has been removed."

Block Page Bypass is available immediately in OpenDNS Enterprise and will also be available in 2010 as an add-on to OpenDNS Deluxe. For pricing and full feature lists, please visit: http://www.opendns.com/start

To contact a sales representative and find out how your organization can benefit by switching, please visit: http://www.opendns.com/switch

About OpenDNS OpenDNS is the world's leading provider of Internet navigation and security services that make networks safer, faster, smarter and more reliable. Through DNS resolution, cloud-based Web content filtering and security services, OpenDNS empowers millions of households, schools and businesses to control how users navigate the Internet on their network, while dramatically increasing the network's overall performance and reliability

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...