You are on page 1of 4

1

iProxy Overview

iProxy server was to be able to share an Internet connection between multiple client machines while
reducing the amount of Internet traffic and speeding up browsing by caching Internet content locally on
the proxy server. Whenever content was required from the Internet, the client would establish a
connection with the iProxy server, which would provide the content from its cache, if it could (otherwise
it would establish its own connection with the content server), retrieve the content, and then forward it
to the requesting client.

iProxy servers provide security suites that use rules to accept or reject requests, log Internet activity,
and scan incoming and outgoing data for viruses and other malware. It also will prevent clients on the
Internet from havingg direct access to content servers within the corporate network. iProxy able to cache
content from content servers, shield them from DDoS attacks, and load balance to a number of content
servers transparently.

Why iProxy Solution

Since many companies had Internet users, this presented very little problem. However, the Internet has
grown, probably exceeding what the original designers ever dreamed and with this expansion, comes
the need to increase the internet bandwidth and establish policy to limit users web surfing activity
toward forbidden content. Do you consider question listed below?

• Why took so long time to load a webpage?


• Does the organization’s internet bandwidth reach the bottleneck?
• How to disallow users to access forbidden website?
• How to disallow
ow users to access social media website during office hour?
• How to disallow a department to access forbidden website?

iProxy Feature

• Open Source software that comes with source code provides greater flexibility by
b allowing
further enhancement
• iProxy does not come with any license requirement which limits the usage by number of users
or connection
• iProxy requires only a web browser for management
• Have different access rules based on time of day, day of the week, date etc.
• Increase employee productivity and save network bandwidth
• Monitoring staff for violations of acceptable use policies

iDGS SDN. BHD. (865736-K)


2

• A degree of control is offered to the system and network administrators


• Ability to restrict the users to particular times of the day, or by machine name, or by network IP
addresses range
• Ability to block the users from visiting undesirable sites, do usage accounting and force
authentication prior to accessing the Internet
• Green to environment (Web Web cache eases the load on the origin servers)
servers
• Hierarchical Caching
• Over 55 blacklist
ist filter categories

iProxy Screenshots

Image 1.1 – User friendly interface to ease


Network Administrators
Administrator perform
Configuration & Management in line with
company HR/security policy easily. Consistent
interface design increase learnability and
usability.

Image 1.1

Image 1.2 – iProxy consist of flexible report


generator to assist Network Administrators
to perform their daily maintenance.

Image 1.2

iDGS SDN. BHD. (865736-K)


3

Image 1.4

Image 1.3 & Image 1.4 – iProxy able convert system log
to meaningful graph to allow Network Administrator
monitor the activity and resource consumption. The
system will able to generate detail report for TCP & UDP
protocol.

Image 1.3

Image 1.5 – Current image shows users access


report. It will allow Network Administrators
Ad to
identify user activity and determine to blacklist the
potential website that violates the company HR /
Security policy.

Image 1.5

iDGS SDN. BHD. (865736-K)


4

Professional Services

iDGS’s professional services group understands your business needs and provides you with measurable
business value. We leverage our experience to expertly guide you in analyzing, configuring, deploying,
integrating, and maintaining iDGS solutions. Our team is ready to help you today to deliver complete
solutions that include everything needed from concept to completion. iDGS provide the following
support and services:

• Consultant services – Prioritize issues, both on a site-specific


specific and on an overall basis, and
suggest recommendations for repairs and improvements.
• On-Site System m Analysis – Collect, analyze, and record current server and network
architecture and performance issues for each site.
• Site installation service – Server and application deployment on customer location.
On-Site
• Network Administrators Training – Provide trainingg for network administrators on product
introduction, installation and configuration.
• Telephone and Email support – Assist customer troubleshoot problem via telephone and
email.
• Support Maintenance – Provide level 2 or 3 system support and maintenance services
serv to all
systems that we had deployed.

To learn more about we can help you, call or email our network experts for more information.

Headquarter
29A, Jalan Sultan Idris Shah, 32200, Lumut, Perak
Fax: +605-6837173

Branch 1
Unit #A-05-08, Savanna Bukit Jalil, Jalan 1/155A, 57000 Bukit Jalil, Kuala Lumpur
Fax: + 603-89949829

Branch 2
PT10858 (Behind Giant), Pusat Peniagaan Manjung Po
Point
int 1, 32040 Seri Manjung,Perak
Tel: +605-6881001

E-mail: inquiry@idgs.my

iDGS SDN. BHD. (865736-K)

You might also like