GFI WebMonitor 2011 R3 review
GFI's WebMonitor software focuses on providing stiff web content security and costs a lot less than an appliance. Dave Mitchell loads it up in the lab to see if it can keep your users out of trouble and your network safe.
The latest R3 version supports the ThreatTrack service which uses GFI's SandBox malware analysis tool to check web sites to see if they're harbouring malicious content. These are added to the ThreatTrack data feeds which WebMonitor uses to check sites being accessed so it can block them immediately.
Previous versions had limited IM app controls but, along with Windows Live Messenger, R3 can now block Yahoo! Messenger, Gmail chat and other IM portals including Facebook. Streaming media also comes under WebMonitor's remit and a soft blocking feature allows trusted users to override a warning page and continue browsing.
WebMonitor is available in three versions with the WebFilter Edition enforcing policies for web content filtering, browsing time and media streaming. If you just want anti-virus scanning, phishing protection, IM app controls and ThreatTrack then check out the WebSecurity Edition which uses scanning engines from Norman, BitDefender or Kaspersky.
On review covers the UnifiedProtection Edition which combines everything from the other two versions. The price we've shown includes dual scanning engines from Norman and BitDefender. Kaspersky is an extra 12 per seat which does increase costs significantly.
Prior to installation you must decide how you want to deploy WebMonitor. The simple proxy mode only requires one network port on the host, but your router must block all web traffic coming from the LAN. We opted to load it in gateway mode on a Windows Server 2008 R2 system with two network ports as this doesn't require any router changes. Ensure you have all required ports active before loading the software as the installation wizard only offers deployment choices based on what it can see.
In This Article
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now