Data centers

05:21 PM
Randy George
Randy George
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

Metering Social Networking Sites At The Gateway

Most managers have no problem with a little internet frivolity during business hours. A personal E-mail here and a Facebook posting there can't possibly interfere with productivity on any measurable scale, right? Then there's "that guy." You know him, the guy who is on Facebook all day long. The guy who's connected with everyone on LinkedIn. The guy who tweets every detail of his day to the world. In other words, the guy who ruins everything for the rest of us.

Most managers have no problem with a little internet frivolity during business hours.  A personal E-mail here and a Facebook posting there can't possibly interfere with productivity on any measurable scale, right? Then there's "that guy." You know him, the guy who is on Facebook all day long. The guy who's connected with everyone on LinkedIn. The guy who tweets every detail of his day to the world. In other words, the guy who ruins everything for the rest of us.

Increasingly, IT Managers are being asked to rein in staff who lack the self-control needed to balance work and play effectively. From a technical perspective, the traditional approach to solving the problem has been somewhat Neanderthal: block social networking sites completely at the firewall. Alternatively, you can generally apply bandwidth quotas on a per connection basis to a particular site with your caching appliance, which is a somewhat effective way to police usage.

A more interesting approach, and one that I predict will become more widely used, is time-based metering.  For example, suppose you could define a new policy at the gateway using Boolean logic that says: "Only allow Bill Smith to access Facebook between 12-1PM," or, "Only allow Bill Smith to access Facebook for 30 minutes per 24 hour period."

Organizations are asking for more versatile policy enforcement capabilities in their proxies, and just today, I saw a demo of a SaaS based Web Security solution that implemented this very feature. Politically, it's much more palatable to enforce a tough-love usage policy as opposed to breaking out the nuclear option.

If you're applying time-based or bandwidth metering in your environment, I'd love to hear more about what tools you're using to do the job, and how the policy itself is going over with your employees. Respond to the thread here and share your experience with us.

Randy George has covered a wide range of network infrastructure and information security topics in his 4 years as a regular InformationWeek and Network Computing contributor. He has 13 years of experience in enterprise IT, and has spent the last 8 years working as a ... View Full Bio
Comment  | 
Print  | 
More Insights
Hot Topics
11
Fall IT Events: On The Road Again With 10 Top Picks
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/29/2014
7
Have You Hugged Your Sysadmin Today?
Susan Fogarty, Editor in Chief,  7/25/2014
3
Cisco Ships APIC Controller, Reveals ACI Pricing
Marcia Savage, Managing Editor, Network Computing,  7/29/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed