Anti-Virus & Web Defense Service Overview

This easy-to-use Web security solution effectively blocks quickly-evolving Web threats, including spyware, viruses and phishing attacks, while enabling greater control over unauthorized Web surfing by employees.

  • Spyware Blocking
  • Anti-virus Defense
  • Anti-Phishing Protection
  • Advanced URL Filtering
  • Safe Search Security
  • Group policies management
  • IP and user-level authentication
  • Real-time threat, content, and Internet usage reports
The Dymin Web Defense Service is a fully-managed Web security solution that delivers effective protection against quickly-evolving Web threats like spyware, viruses and phishing attacks and incorporates technology to prevent unauthorized Internet activity. End users are protected from threats, while IT administrators gain peace of mind, visibility and control over Web usage, and spend less time repairing computers corrupted by malware.
The Dymin Web Defense Service will help your organization to:

  • Improve employee productivity Reduces computer downtime, unproductive Web surfing, network congestion.
  • Reduce IT costs Frees IT staff from threat management, enabling them to focus on core business needs. Fewer Spyware and virus infections mean less PC rebuilding, cleaning, and maintenance, better PC performance, and fewer Help Desk calls.
  • Improve security Blocks malicious code like spyware and viruses, and by protects your users from fraud via Phishing attacks.
  • Reduce liability Lowers the risk of confidential information leaks from spyware, and lawsuits due to exposure to offensive content.
  • Increase Web usage visibility Enables administrators to determine how their users spend their time on the Web.
  • Enforce corporate or regulatory Internet use policies Provides tools that help administrators to establish and enforce appropriate filtering policies.
  • Identify problem users or Spyware-infected computers A wide range of reports enable administrators to observe usage patterns and identify installed phone home attempts by spyware.
The Dymin Web Defense Service complements the Dymin Email Defense Service with four package options:

  • Dymin Web Defense Service – Threat Control blocks Spyware, viruses and Phishing attacks.
  • Dymin Web Defense Service – Content Control blocks access to inappropriate websites.
  • Dymin Web Defense Service – Total Control a bundle of both Threat Control and Content Control.
The Web Defense Service can protect your users, and your business, by blocking malicious code with the Dymin Web Defense Service – Threat Control package and preventing exposure to inappropriate Web content with the Dymin Web Defense Service – Content Control package. And finally, Dymin Web Defense Service – Total Control offers comprehensive protection against Web-based threats.

  • Dymin Web Defense Service – Threat Control: As your users surf the Web, Threat Control blocks known spyware, Trojans and viruses including those in Webmail messages before they reach your network or computers. Spyware that is already installed will be prevented from phoning home to deliver its payload of secretly-collected data. Phishing attacks are also blocked which to protect users from fraud and identity theft.
  • Dymin Web Defense Service – Content Control: Businesses can limit liability and promote a wholesome work environment by defining policies that limit where users can surf (e.g. no pornography, gambling). Productivity can be increased, and network bandwidth conserved, by minimizing or controlling access to online distractions such as personal webmail, gaming sites, or media downloads. Security is improved, since many unsavory websites are used to propagate malware, and blocking access to these sites reduces exposure to the threat. Our Safe Search feature prevents employees from downloading sexually explicit content from leading search engines and their caches (like images.google.com).
  • Dymin Web Defense Service Total Control: A bundle of both the Threat Control and Content Control packages.
The Dymin Web Defense Service adds several necessary layers of protection for email users who also access the Web:

  • Webmail users can become infected with viruses or spyware by downloading malicious attachments from their personal Webmail accounts. These emails and their attachments are not filtered by email securityservices such as the Dymin Email Defense Service, as they are downloaded via HTTP and not SMTP. TheThreat Control package provides virus scanning which detects malware retrieved via webmail attachments.
  • Content Control enables administrators to enforce policies which prevent users from accessing popular Webmail sites (like Yahoo!, Hotmail, or Gmail).
  • Threat Control protects users who are lured to fraudulent websites through Phishing emails. Users click on a Web links within Phishing emails when Threat Control blocks their Web client from accessing the fraudulent Phishing site. Similarly, users who click on fraudulent links within Instant Messages are also protected by Threat Control.
  • An increasing amount of malware is distributed via the web, and users can become infected just by visiting a malicious or hacked web site. The malware problem has grown beyond just email.
Thousands of organizations choose the fully-managed Dymin Email Defense Service over appliances or software. Similarly, managed Web security services offer greater benefits than appliances or software, including:

  • Prevents threats from entering the network: Filtering is performed at the network perimeter, the outermost layer in a multi-layered security strategy, which prevents malware from reaching an organization’s network or computers.
  • Stops threats before they reach the PC: Old security paradigms use a scan and remove approach to malware. Dymin prevents PCs from becoming infected and blocks malware downloads before they reach your systems.
  • Up-to date security: The Dymin Theat Center keeps pace with quickly-evolving Web threats and continually updates our system to protect against even the latest threats. Administrators aren’t forced to continually update systems with new hardware, patches, signature files, and URL category lists.
  • Flexible, scalable protection: The Web Defense Service automatically grows as you grow. Our Operations team builds out our infrastructure so that you don’t have to add capacity as your user base or Web usage grows. If your organization adds new geographic locations, you don’t need to deploy additional servers for Web filtering.
  • No upfront costs. Our service does not require an up-front investment in hardware, software or setup fees. Some companies prefer to pay a monthly subscription service fee from their operating budgets and pay as they go rather than draw on their capital budgets.
  • Rapid activation. Procurement is simple and fast. Once you’ve purchased our solution, you don’t need to wait for hardware or software to ship. Nor do you need to install it. The setup and administration of our service is simple, and is performed via a Web console.
  • Simplifies the desktop. PCs can become crowded with point solutions (e.g. separate software for antivirus, anti-spyware and URL filtering). These point solutions become a maintenance issue and can introduce compatibility problems. Dymin does not rely on software installed on your users PCs.
  • More reliable and available. Our Web security service is hosted in our data centers and is managed by our Operations and Threat Center teams.
  • Tamper proof. With the proper network configuration, users can’t bypass the Web Defense Service.
  • Easy administration. Administration and reporting for both the Web Defense Service and Email Defense Service is performed via the Dymin Control Console, our intuitive easy-to-use Web-based platform.
Users will see an access denied Web page when they attempt to download malware, or if they attempt to visit Web pages which violate the policy set by your administrator.
Your Web traffic is routed through our Web proxy servers, which filter the traffic according to policies you’ve determined in the Dymin Control Console. Threats are stopped safely at the network perimeter before they reach your computers or network.

  • First, Content Control and Phishing policies are applied, which prevent users from accessing inappropriate websites. If the user tries to visit an uncategorized site, our Dynamic Realtime Rating engine attempts to classify the site on the fly, which is essential, as many new inappropriate Websites come online each day.
  • Spyware payloads are blocked as spyware tries to phone home.
  • An access denied Web page is displayed when access to the undesirable Web page is blocked.
  • Finally, Web traffic is scanned for malicious code, including spyware, viruses and Trojans.
Most users will not experience slower Web browsing with the Web Defense Service. Since our proxy servers cache local copies of popular Web content, as popular Web accelerators do, some users will experience faster browsing performance than if they bypassed our filtering service. By keeping your PCs free of spyware and other malicious programs, the Web Defense Service helps PCs to run faster, which also improves Web browsing performance.
Dymin minimizes HTTP latency a number of ways, including:

  • Content caching: Popular content is cached on our proxy servers, so it can be sent to the client more quickly than retrieving it from the target website, which is commonly done by popular Internet accelerators.
  • Parallel processing: Web pages are often a collage of elements retrieved from multiple locations. Our servers accelerate page loading by retrieving Web page elements in parallel.
  • Excess capacity: Our Operations team ensures that our network and servers have sufficient capacity to handle spikes in Web traffic.
  • Intelligent malware scanning: Our process streamlines resource-intensive virus/spyware/Trojan scanning by remembering objects that have been scanned previously, and only scanning unknown objects. Small objects (like images typically embedded in a Web page) are processed separately and with higher priority than large objects (like file downloads). This ensures that users doing large file downloads don’t negatively affect the time-sensitive Web browsing of other users.
  • Fewer network hops: We minimize network latency by locating our Web filter servers just one hop away from multiple tier-one network providers. This means fewer hops for your traffic to reach our proxy servers, and fewer hops for our proxy servers to reach your target websites.
Yes, your administrator can define a list of trusted websites. If your organization subscribes to the Threat Control package, content from sites on the trusted sites list is still scanned for viruses and Trojans.
Unclassified websites are identified and automatically submitted for classification. Users can also nominate websites for prioritized classification by clicking the Feedback button on the Web Defense Service console. Uncategorized websites (usually new or visited infrequently) are scanned in real time by our Dynamic Realtime Rating Service, which does an exceptional job of identifying unsavory content.
Web Defense Service anti-virus protection is provided by Kaspersky Labs’ award winning anti-virus engine. Kaspersky Labs’ engine is outstanding at identifying Trojans, which are a favorite method of distributing spyware via the Web. Our systems automatically update their virus definitions within minutes of publication.
No. While the Web Defense Service prevents Trojans, viruses and spyware from being downloaded via the Web, it does not remove malware from previously-infected computers. However, if your users have this preexisting condition, our service will prevent installed Spyware from phoning home via HTTP to deliver a payload of spied information to a collection site.
Should a user click on a link to a fraudulent website (usually via a phishing email or Instant Message), Threat Control blocks access to the site if it is known. Multiple sources of phishing site data help ensure that your users are protected by these evolving transient threats.
No. A key benefit of our Web Defense Service is that filtering is performed on our servers, not on your computers. No software. No hardware. No updates. No hassles. You can administer your filtering policies from anywhere, at any time, via our Web-based Dymin Control Console.
Administrators are able to view eight reports, which include graphs and exportable data for selected time periods (day, week, month) for up to three months prior.

  • Traffic Overview: inbound and outbound traffic volume, number of Web requests, number of blocked requests
  • Threat Overview: number of viruses, spyware and phishing incidents blocked
  • Virus Threats: number of virus incidents blocked, along with virus name
  • Malware Trojans: number of objects that were found to contain a Trojan, which is a favored way of distributing spyware via the web
  • Spyware Sources: number of visits to sites that are known to host spyware
  • Spyware Effects: number of times spyware has tried to �phone home� to deliver a payload of spied information to a data-collection site
  • Phishing Threats: number of phishing incidents blocked
  • Content Allowed: Data volume and number of web requests per category for traffic allowed per the filtering policies
  • Content Blocked: Data volume and number of Web requests per category for traffic blocked per the filtering policies. Drill down to see specific sites that users tried to visit
  • Audit Trail: See which administrators have logged in and made changes to configuration or policies
You direct your Web traffic to Dymin’s proxy servers. Configuration instructions will be provided in a Web Defense Service Welcome Kit, which will be emailed to you after registration. Typically, users can set up their HTTP proxy settings within a few minutes.
No. You can choose to provision a small number of users in the beginning of the test, and then roll out the service more broadly at a later time.
If your users are already routing their Web traffic through a web proxy server (e.g. Squid, Microsoft Proxy Server, Microsoft ISA Server, Symantec Web Security), the easiest way to route all of your users’ Web traffic through the Dymin Logic Web Defense Service is to chain your existing web proxy server to the Dymin service. Many multi-purpose firewalls have a built-in Web proxy server. (e.g. SonicWALL) which can be configured to automatically proxy Web traffic to the Dymin service. If your organization already uses a multi-purpose firewall which can redirect Web traffic, you can use it to route Web traffic to Dymin. (Note: Some Web proxy servers are incompatible with the user authentication method used by the Dymin Web Defense Service.) Businesses with a small number of users may want to configure each browser’s proxy settings manually. Alternatively, Microsoft’s Active Directory or a PAC file can be used to automatically update the browsers proxy settings.
In the unlikely event of a prolonged outage of the Web Defense Service, your IT staff or end users are able to restore (unprotected) access to the Internet by reconfiguring their browsers or internal Web proxy servers to route traffic directly. We suggest that you prepare a step-by-step instruction sheet that your IT group or end users can use to temporarily reroute Web traffic directly to the Internet, bypassing the Web Defense Service until the outage has been resolved.
Bypassing the Web Defense Service is a matter of undoing the configuration changes that route (or force) your Web traffic to our proxy servers. This may involve changes to individual Web browsers proxy settings, changes to internal Web proxy servers, and changes to your firewall, depending on how your organization configured access to the Web Defense Service

Need Help?

Tell us about it below.