SWG Hands-On eBook - page 24

24
Check Point Products & Solutions
Selling Secure Web Gateway
Identifying Legitimate Web and Application Access
Now that we blocked the bad stuff, lets see if some of the stuff we blocked might
have a work related use. If we can find a reason to unblock some sites or
applications used for legitimate purposes, we can then make specific expectations
for their use. We can be proactive in allowing access to some sites and
applications before we block them and get complaints from our users.
1...,14,15,16,17,18,19,20,21,22,23 25,26,27,28,29,30,31,32,33,34,...62
Powered by FlippingBook