advertising information

CNN.com
 MAIN PAGE
 WORLD
 ASIANOW
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
 TECHNOLOGY
   computing
   personal technology
   space
 NATURE
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 HEALTH
 STYLE
 IN-DEPTH

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

  CNN WEB SITES:
CNN Websites
 TIME INC. SITES:
 MORE SERVICES:
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines
 pointcast
 pagenet

 DISCUSSION:
 message boards
 chat
 feedback

 SITE GUIDES:
 help
 contents
 search

 FASTER ACCESS:
 europe
 japan

 WEB SERVICES:
COMPUTING

Should people who surf the Web at work be beached?

February 4, 1999
Web posted at: 11:17 a.m. EST (1617 GMT)

by Peter Cassidy

From...
CIO

(IDG) -- The Web is the world's biggest playground. Almost anyone with a computer and an Internet protocol (IP) connection can find endless entertainment and recreation ranging from retail catalogs to sports news to video clips from The Simpsons. Providing such content is a growth business. Unfortunately, as any IT manager knows, that means other businesses may find their networks—and their productivity—seriously burdened by workers amusing themselves with Web-based diversions.

Naturally, headlines target high-sleaze-quotient cases like the dismissal of two stock analysts from Salomon Smith Barney Inc. in March 1998 for trading smut over the company's network. Theoretically, employees gawking at pornography on their computers could, under the current U.S. Supreme Court interpretation of labor law, contribute to the creation of a "hostile working environment." But it's tough to find a case that has been successfully argued this point.
INTERACTIVE:

Should people who surf the Web at work be beached?

Yes No
View Results

On a practical level, Web access control in the corporate environment creates a bear of an IT planning issue. Employee surveillance raises questions of privacy and fairness. Web access control turns even simple questions into politically charged dilemmas: Who reads which employees' usage logs under what circumstances?

Still, IT executives must wrestle with the question of not only whether but how to control Internet usage so that their networks aren't burdened by unnecessary traffic that can slow response times and call for premature hardware upgrades.

Coming into this contentious space are several products from vendors and service providers such as Kansmen Corp. of Milpitas, Calif., and SurfWatch, a division of Naperville, Ill.-based Spyglass Inc.

These management tools are arriving none too soon. Courtney Munroe, program director for business network services for International Data Corp. in New York City (a sister company to CIO Communications Inc.), calls Web access management an issue destined to take up an increasingly large share of the IT spotlight because corporate IP connectivity still faces a large growth curve—especially in the small to midsize business arena. Out of an $8 billion market for IP access, the corporate segment is currently about $3.5 billion-$2.5 billion for dedicated lines and $1 billion for dial-up access, Munroe says.

Auditing and control systems, however, will lag behind deployment of IP-mediated applications for awhile, as they have in other cases. Abuse of corporate telephone systems, for example, was brought under control only with the advent of call-accounting systems in the 1980s. These tools provide call logs for each telephone extension, showing the length and cost of each call. One drawback, however, is they don't show who was called or why.

But thanks to the logging systems built into Internet technologies, surfing the Net does leave a detailed data trail. That IP meta-data is employed by all the access control and monitoring suites, allowing IT managers to know the exact destination of all Web excursions—a powerful stick in monitoring workers' Web use.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Make your PC work harder with these tips
 Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  IDG.net's products pages
  Questions about computers? Let IDG.net's editors help you
  Search IDG.net in 12 languages
  Subscribe to IDG.net's free daily newsletters
 News Radio
 * CIO radio
 * Fusion audio primers
 * Computerworld Minute
   

To that end, Roy Crooks, director of IT at Bard Manufacturing Inc., in Bryan, Ohio, notified the company's 400-plus employees late in 1997 that the company would begin monitoring their Web use. Crooks, who had observed a little more non-work-related surfing than he considered appropriate, mounted Elron's Internet Manager from Elron Software Inc., in Cambridge, Mass.

Internet Manager monitors Web usage in real-time, creates custom reports on usage (much like a call-accounting system) and can build a custom blocking list that denies employees access to pages containing customizable key words, such as basketball, Ku Klux Klan or Lewinsky.

To Crooks' surprise, however, the Web-monitoring effort indicated the company's biggest bandwidth-grabber wasn't employees wasting time on unauthorized sites—it was the PointCast push-based news service many employees used regularly on their desktops. Installing PointCast didn't in itself violate the company's Web-use policy. But most users hadn't modified PointCast's default settings that direct the service to automatically perform many long downloads during the day, claiming a good deal of network bandwidth in the process. Crooks suggests that if this diversion of resources had gone undetected, it might have led to a premature and expensive network upgrade. As a class, Web access control products are rather new toolsets.

Once the sheer wonder of IP connectivity abated, IS personnel quickly realized they had to get a handle on usage before the corporate networks were overwhelmed by employees downloading bandwidth-gobbling Beastie Boys clips. The first attempts at Web access control were nothing more than network administrators eyeballing raw log files identifying long visits to domains of questionable business value, such as www.playboy.com and www.espn.com, and telling offenders, "Don't go there."

Several vendors now provide IP management suites, which typically monitor usage by automatically examining log files that record the places users visit on the Web and translating that data into an easy-to-use report. Most also give IT managers the choice of monitoring or actively blocking domains that managers consider inappropriate for employee visits on work time.

Though most products do allow privileges to be assigned to individuals, they typically group users into classes of privilege. When employees log onto the Internet—usually through an Internet proxy server where many of these systems reside—they get the amount of latitude assigned to their class. For instance, IT executives might be able to access any page anywhere on the Web; mail-room employees might receive access only to shipping-business sites.

But at Miltope Inc., in Hope Hull, Ala., the most critical step in the employee Web-monitoring process was the most nontechnical one: building an acceptable-use policy.

Miltope, a manufacturer that "ruggedizes" computer equipment for military customers, wanted to make sure its 500 employees used their Internet access strictly for business purposes. Miltope's management ended up assigning employees to 1 of 10 access categories in SurfWatch Professional, each providing access to different types of Web sites. Now when a Miltope employee clicks for a page, SurfWatch checks the user's identity against what's allowed for that category and then decides whether to load the requested page or notify the user the request has been denied. SurfWatch logs requests for banned pages for managers' later inspection.

Bill Gassman, senior analyst with GartnerGroup Inc., in Stamford, Conn., respects the reasons companies use filtering products. However, he advises organizations to consider the scaling limitations inherent in packages that reside on the proxy servers. Filtering these requests by comparing the page to lists of prohibited pages and then comparing the request to individual users' privileges is a time-consuming process that can severely burden servers.

"Anytime you introduce complexity to a network, you're also bringing in the possibility of failure and performance problems," Gassman says.

All Web access management suites can monitor usage and block access to sites deemed unrelated to work. Some, like Kansmen's Little Brother, however, can also measure the amount of bandwidth consumed by Internet applications invoked by using so-called packet-sniffing techniques that track the individual data packets.

Packet-sniffing is hardly new technology; in fact, it forms the foundation of many intrusion detection network systems and firewalls, so Kansmen and its contemporaries can expect more competitors.

Consolidation of Web access management suites into security and management systems is already underway.

One security company, WatchGuard Technologies Inc., in Seattle, makes a hardware-based network security suite called Firebox, which includes Web auxiliary access-control features. In addition, Bellevue, Wash.-based Sequel Technology struck a licensing agreement with Computer Associates last year to integrate its Sequel Net Access Manager into CA's Unicenter network management system.

Prices for the stand-alone systems vary considerably. Content Advisor for Firewall-1 NT by Content Advisor Inc., in Somerville, Mass., licenses its product for $1,800 per year for 250 users—which, at that level, works out to about $7 per user. Up from there is Elron Software Inc.'s Elron Internet Manager at $1,295 per 50 users—closer to $26 per user. The prices quoted by companies in this space usually include regular updates of URLs that have been inspected and sorted into the classifications used by their software packages.

Still, no amount of money can buy a perfect hermetic seal against tawdry and useless sites. Given the imperfection of search engine algorithms and the serendipity that guides those who apply meta-tags, any hope of competent automated protection seems a long way off. Gartner's Gassman says managers should be satisfied if even 80 percent of employee Web browsing is work-related, a proportion that could, in large part, be achieved by issuing a written policy. In fact, he says, companies might want to consider distributing the policy with employees' paychecks.

Peter Cassidy is a writer, technology analyst and consultant who is based in the Boston area.

Related stories:
Latest Headlines

Today on CNN

Related IDG.net stories:

Note: Pages will open in a new browser window Related sites:

External sites are not
endorsed by CNN Interactive.

SEARCH CNN.com
Enter keyword(s)   go    help

  
 

Back to the top
© 2000 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.