Network Policy Enforcement
ECS can plan your network policy by analysing at what Internet resources company users need to do their jobs (such as access to e-mail or basic Web pages); as opposed to those resources they might like to have (such as access to streaming audio, video and social Media). Internet access is not an all-or-nothing entity; instead, it is comprised of innumerable individual information services. You are probably familiar with many of these services: Web, FTP, chat, messaging, newsgroups, e-mail, telnet, streaming audio, and video. Firewalls can be employed to individually grant or restrict traffic based on each of these services, and your network security policy should address usage of each service individually.
As you begin to establish your network security policy, you need to address several issues that deal primarily with internal users' ability to access Internet-based resources and services. Many users automatically assume that if they have a computer connected to a network then they must also have Internet access. Unfortunately, the insecurities and threats of Internet have made unrestricted access to the Internet a thing of the past in most organizations.