Content filter, Time based rules, Netflow Analysis & Cloud Reporting for  MikroTik Routers

The LucidView Enforcer is an Enhancement for MiKroTik routers:

* Enabling this feature, does requite LucidView to have remote access to your MikroTik routers, and may require time and material service purchase too.

see live demo

With the Enforcer™ in place your clients will be able to:

  • Completely block or manage access to adult content, social media, gambling sites, malware, torrents and other threats.
  • Set up a custom blocking schedule. eg: Only allow access to Facebook, Instagram, YouTube etc. during specific times of the day.
  • Gain automated oversight of Internet traffic with the tools necessary to prevent access to undesirable content, services, sources of malware, and other online threats.
  • Access activity and vulnerability reports at network level and by individual device.
  • Block access to explicit material and websites offering gambling or pirated content.
  • Access an online portal for the blacklisting & whitelisting of specific sites as well as control by category of content.
  • Allocate available bandwidth by specific activity or device.
  • Enhance employee productivity as Internet use for private purposes is identified and reported upon.
  • Access updates automatically providing new features and continued protection against newly identified threats.

The LucidView ENFORCER™ filters the following categories:

  • Adult – Sites containing explicit content.
  • Gambling – Online gambling sites.
  • Untrustworthy – HTTPS sites that do not have valid SSL certificates hosted on them.
  • Risk – Known malware or phishing sites.
  • Movies – Sites which deliver movies and music content.
  • Anonymiser – Web based proxies and unblock sites to bypass firewalls content filter
  • Torrents – This identifies BitTorrent file distribution system connections, which is typically used for multimedia file sharing.
  • Instant messaging –  (IM) technology is a type of online chat that offers real-time text transmission over the Internet.
  • Highly Suspicious Connections – These are connection that are typically used by hackers to gain remote access into your network, through which they attempt to conduct their nefarious activities such as stealing data, or planting ransomware, etc.
  • Enforce Google Search Safe search — This enforces the Google Safe Search feature on Google searches.
  • Enforce YouTube Safe Search – This will force the the Google safe search filter to be activated for YouTube.
  • Facebook – Facebook & Instagram.
  • Youtube – This will force the the Google safe search filter to be activated for YouTube.