Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT
  • Virtualisation

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Data & Voice Networking Case Studies



October 03, 05

Supermarket chain freezes Internet access

Ultra-restrictive e-mail and web usage policies keep its network cleaner than clean.

By Joel Shore, Network World

Call it Midwestern sensibility, outright paranoia or the direct result of extraordinarily tight-fisted control, but the Kansas City operator of 28 supermarkets and pharmacies is the very model of how a network - and its users - should behave. Not that the users really ever had a choice.

Advertisement

Balls Food's remarkable network usage, documented in an audit performed recently by Networks Unlimited, is the product of restrictive policies that grant Internet access to employees on a case-by-case and site-by-site basis and by aggressive filtering of inbound and outbound e-mail.

How aggressive? Send out an e-mail with an inappropriate attachment and your e-mail privileges might be suspended for a week.

"I'm relieved at the audit results," says CFO Mike Beal, who stands firmly behind the policy.

Harry Segal, president of Networks Unlimited and a veteran of dozens of usage audits was equally surprised. "These results are unusually good."

Usage audits look for exposure in four areas: productivity loss, legal liability, bandwidth consumption and data security.

Balls Food did well in all four. Most users can't get to shopping, auction or sports websites, so there's little lost productivity. Likewise, the inability to access objectionable content minimises legal exposure. Unable to connect to Internet radio streams or download multimedia files, bandwidth is preserved. Finally, spyware, Trojans, viruses and keystroke loggers are kept out through aggressive e-mail filtering and web download prohibitions, assuring the security of sensitive data.

"If we had an open Internet policy, our problems would be much worse," says Lance Fischer, Balls Food's network systems manager. "Our policies and practices are well-established, known by every employee with a computer and strictly enforced." To Fischer, it's mostly about enforcement.

Policy reminders
The policy is hammered home every time a user logs on to the network. As part of the log-on process, users are presented with a dialogue box summarising the policy and reminding them that "the use of this system may be monitored and recorded for administrative and security reasons." To proceed, a user must agree by clicking the OK button.

To assure that it has complete control, Balls Food's network has a "wagon wheel" configuration, with the central office as the hub and the stores as spokes. All traffic moves through the hub and all data is stored at the hub. The point-of-sale system, owned by a different corporate department, runs separately.

With nearly 3,000 employees and a PC population of about 350, roughly 15 people in each of its 28 store locations and 100 at its headquarters have Internet access. To maintain the tightest control possible, access is available only by using the corporate intranet as a gateway. The scheme allows Fischer's team to specify the IP addresses of permitted web destinations to the firewall.

News, sports, entertainment and shopping sites are banned outright. Specific sites that are allowed include those furnishing local weather forecasts, highway traffic reports, the employee assistance program, pension account-status information, drug-screening and background check sites for employee candidates, and direct line-of-business sites such as grocery suppliers and wholesalers.

"Other companies give their employees full Internet access and take it away when there is a problem," Fischer says. "Our attitude is, 'Don't give them anything that's not required to do their job.'"

The one exception is that the pharmacies have unlimited access, because pharmacists need to research potential interactions between prescription drugs and over-the-counter or mail-order remedies.

And it's precisely because of that exception that the audit results weren't perfect.

"Right away, I could see those machines were being used to log into Hotmail and other websites," Fischer says. Web-based personal e-mail sites are Fischer's favourite target. "With Hotmail or Yahoo there's no control over what comes in. We try to block multimedia files."

And with good reason. "In December, people would receive an e-mail with a Christmas tree that you could click on to decorate. It looked innocent enough, but it wound up installing a keystroke logger on people's computers."

That's bad enough, but when the keystroke logger is on a PC in a pharmacy that is already struggling to keep up with US Health Insurance Portability and Accountability Act (HIPAA) privacy mandates, the potential for legal exposure skyrockets. "A keystroke logger is a clear HIPAA violation," Fischer says.

Tools of the trade
Balls Food uses the Perimeter Manager pre-emptive e-mail filtering service from Postini for its corporate system. Incidents of spam quickly dropped to nearly zero, but Fischer especially likes the ability to keep viruses and SMTP attacks from ever reaching the enterprise gateway.

Postini's presence also led to the suspension of one employee's e-mail privileges. As he scanned outgoing e-mail, Fischer noticed unapproved attachments being sent -- attachments that could not have entered through the Postini-protected corporate e-mail system. The source turned out to be a personal Hotmail account, accessed by an employee who then relayed the content through the company's Microsoft Exchange Server.

"We shut down someone's e-mail for five days," Fischer says. "Losing the ability to send legitimate mail caused a lot of grief." Draconian perhaps, but the measure did not need to be repeated.

Inside the audit
To measure user activity, Networks Unlimited employed a server on which it installed Websense, configured as a passive logging tool that performed no filtering action of its own. Segal shipped the server and an engineer to Kansas City to install it.

Network activity for a representative group of pharmacies and headquarters PCs was logged for 11 consecutive days. The server was then shipped back to Networks Unlimited for analysis. Data was extracted and annualised totals were extrapolated; each hour of logged activity over the audit period scaled to 33 hours over the course of a full year. Following compilation of the results, Segal flew to Balls' headquarters to present his findings.

On an annualised basis, Balls employees behaved far better than counterparts at other similarly sized companies audited by Networks Unlimited.

Where Balls staffers spent just 686 hours accessing web-based e-mail, workers at a midsize medical centre wasted 1,477 hours, while employees at a similarly sized law firm squandered 6,525 hours.

The law firm logged visits to dozens of gambling sites, with activity dipping during lunch and plummeting after 6pm. There's only one interpretation, according to Segal: "They're visiting these sites during working hours." At the law firm, the top source of downloaded streaming media was espn.com. At another law firm, identical time-of-day usage patterns were noted for sites featuring adult content. The conclusion was that employees are surfing when they should be working, and they rarely skip lunch.

Where Balls reported no Internet radio streaming downloads, the law firm, during its one-week audit period, logged more than 3GB of streaming content. That one non-business-related activity works out to more than 156GB over the course of a year.

At Balls Food, employees spent 429 hours at personal shopping sites, compared with a slightly more than average 2,073 hours by staffers at the medical centre.

"There can be no doubt that because Balls started with a closed policy, it has maintained control and protected its network, data and the company itself," Segal says.

With dozens of audits performed over the last two years, Networks Unlimited is seeing personal usage patterns change significantly. Peer-to-peer activity, once typified by download services such as Napster, has dropped steadily, while instant messaging use has risen dramatically. Visits to sites featuring adult content have remained largely constant.

More to do
Despite the restrictive policies that prohibit access to all but a handful of carefully chosen Web destinations, Balls Food is about to embark on a corporate-wide deployment of the Websense security and filtering platform. Its policies already running contrary to conventional thinking, Fischer, perhaps not surprisingly, takes a contrary view of Websense, too.

"Most companies use Websense to clamp down on employee Internet activity. We'll do the exact opposite; I see it as a way to gradually widen Internet access," he says.

Fischer is realistic enough to know that Balls' policy of granting access on an employee-by-employee and site-by-site basis simply doesn't scale up for corporations with thousands of employees.

"What these companies must do is actually enforce their electronic use policies and prohibit access to anything that wastes company resources or endangers the network," Fischer says.

Follow highlights from Techworld on Twitter
Stay Informed > Subscribe to our Newsletters
The UK IT News widget Get it for your site!

close

Email this article to a friend or colleague:




PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

close
  • This article is now being printed.
close

What are your views on this subject? Use the form below to post a comment on this article up to 1000 characters.


Characters remaining:

close

Click below to add 'Supermarket chain freezes Internet access ' to your blog.



If you do not have a ComputerworldUK Account and would like to use this feature, please Register.

If you are a registered, logged-in user, this will post the title and first paragraph of this story to your blog to share with your readers.

What is this?

<<newer article | back to index | older article>>



Advertisement
Advertisement

WHITE PAPERS

  • 5 steps to successful IT consolidation and virtualisation
    The reasons to consolidate and virtualise IT infrastructure are wide-ranging. While most IT managers focus on just the cost of the physical IT infrastructure, there are many additional benefits that can be derived from IT consolidation: Simplified management > Improved data protection > Improved resource utilization > Easier revision control > Easier data protection and security > More flexibility > Reduced server and software costs
  • Complex Event Processing
    We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused, and this isn't helped by the various terms and acronyms used by software vendors and the market.
  • A Smarter Approach to WAN Optimisation
    With Unified Performance Management, the core capabilities needed to effectively manage the WAN and ensure optimal application performance are incorporated into a single network appliance. These capabilities include real-time monitoring, reporting, traffic control, optimization and acceleration – all integrated and accessible through a common interface and centralized management platform.
  • Best Practices in Optimizing WAN Performance
    Improve your WAN performance with this helpful best practices guide
  • How Flexible Are You On Flexible Working?
    IDC’s latest executive brief examines how organisations should be leveraging ICT more effectively to increase the utilisation and output from their workforce. It explores how organisations are applying flexible working practices, the process they are following, and how they have overcome the challenges they have faced.

Techworld topic pages