Don’t let size fool you.

November 30th, 2016

smallpower

 

Don’t be fooled by the name–CyBlock Mini Appliance is powerful, comprehensive, and worth every inch of its compactness.

Maintaining visibility throughout your workforce is key to running a secure business today. Don’t settle on just any solution that really doesn’t meet your needs. If you need coverage for a remote office, have limited space either in your server room or in your office, or are struggling with how to keep your business secure with a limited IT budget, Wavecrest has more choices than ever. No matter what business size or industry type, CyBlock Mini Appliance is likely to be just what you have been looking for.

The powerful Mini Appliance provides the comprehensive Web-use security capabilities of CyBlock, including HTTP and HTTPS URL filtering, comprehensive detailed reporting, secure guest Wi-Fi services with captive portal, advanced threat protection, bandwidth management, cloud services management, as well as coverage for non-HTTP activity, e.g., P2P, torrents, IM, and e-mail. Get all of this in one compact and economical package. The general size of a Wi-Fi hub, the Mini allows you to put it in the corner, on your desk, or in that tiny space you have left in your packed server room!

As a cost-effective choice for any business type or size, the robust, yet compact Mini Appliance provides the leading-edge, comprehensive Web-use security capabilities of CyBlock. Designed to fit every business environment, the Mini Appliance can be paired with CyBlock Appliance or deployed on its own, depending on the required Web-use security solution needs.

For more information on CyBlock Mini Appliance or any of our other products, please contact us today!

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

CyBlock/Cyfin Release 9.2.7 Now Available

November 28th, 2016

We recently released new versions of CyBlock and Cyfin. In this release, a new user ID will be added in new installations or accounts to compile machine updates that produce Web traffic. Also, for products that are uninstalled, a product-specific uninstall page will be displayed to allow you to submit feedback to Sales. The enhancements are highlighted below.

  • CyBlock
    • User ID for Machine Updates. The new *$ user ID with full name “machine updates” will handle machine requests for updates that produce Web traffic. Previously, the traffic was displaying in Dashboard charts with a machine name, and in reports, as an IP address. These URLs are grouped as *$ in the VIP group. Click here for more information on machine names.
  • CyBlock Directory Agent, CyBlock Software, and Cyfin
    • Web Site Uninstall Feedback Page. After uninstalling, a product-specific uninstall landing page will be displayed with a feedback section to be completed and submitted as applicable.

There are also corrections in this release. To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

CyBlock/Cyfin Release 9.2.6 Now Available

November 14th, 2016

In Release 9.2.6, we are pleased to provide the ability to pair multiple cloud accounts in Hybrid deployments extending your local CyBlock policies to employees in multiple regions. Multiple cloud accounts can also be paired with your CyBlock Directory Agent instance to update the groups and IDs information for employees across multiple regions.

Also in this release is the ability to set a different time zone in your cloud account based on where your Web activity is occurring versus the time zone of your cloud instance. For MSP Partners, the time zone can be set for each of your customers. For Hybrid deployments, the time zone can be set for each of your cloud accounts. The enhancements are highlighted below.

  • Multiple CyBlock Hybrid Cloud Accounts
    • Hybrid Configuration. The ability to pair your local CyBlock installation with multiple CyBlock Cloud accounts is now available on the Hybrid Configuration page. Any configuration changes, including policy changes, in your local CyBlock instance are automatically synced with all paired cloud accounts.
    • Data Management. The cloud log file name is now in the format cloudproxy_cloudserver+port_date.txt and is truncated. You can hover over it to view the full name.
    • Real-Time Web Monitor. Your multiple hybrid configurations are displayed in the Data Configuration drop-down field. Monitor the live Web traffic of any cloud account by selecting the associated hybrid configuration.
    • Reporting. Your multiple hybrid configurations are also available for selection in Dashboard charts and in reports allowing you to view the data for any cloud account.
  • Multiple CyBlock Directory Agent Cloud Accounts
    • The ability to pair your CyBlock Directory Agent installation with multiple CyBlock Cloud accounts is now available on the Directory Agent Configuration page. This allows you to synchronize your internal Active Directory with multiple cloud accounts.
    • Any AD configuration changes in CyBlock Directory Agent are automatically synced with all paired cloud accounts.
  • Cloud Web Activity Time Zone
    • Cloud Customers. The time zone in which your organization’s Web activity is occurring can now be set in your CyBlock Cloud account. The default Web activity time zone is the time zone of your cloud instance, but this can be changed. Web activity displayed in the Dashboard charts, reports, and real-time monitors will reflect the time zone that is set for your cloud account.
    • MSP Customers. For MSP Partners, the time zone can be set for each of your customers. Web activity displayed in the Dashboard charts, reports, and real-time monitors will reflect the time zone that is set for that specific customer.
    • Hybrid Deployments. For Hybrid deployments, the time zone can be set for each of your CyBlock Cloud accounts. Reporting is based on your local CyBlock instance time.

There are also corrections in this release. To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

Are Santas taking over your network?

November 10th, 2016

Santas on computers at Virgin Megastore

Can you believe that it is almost the end of the year already? A lot has happened for us this year, and it seems to have made the year go even faster. No matter how fast or slow the year went for you, it is time for all of us to think of the holiday shopping season that is coming up.

Every year, it is predicted that more and more of us will be using online shopping to get a good portion of our list taken care of. With time constraints in normal life, your employees are definitely going to sneak in some shopping on their work devices, clogging up your network bandwidth with nonessential traffic–and it probably won’t just be on Cyber Monday!

Don’t experience additional holiday stress. Go ahead and allow your employees a bit of freedom to do some surfing to find the right toy, tie, or TV for their loved ones. But also give yourself, your IT department, and your whole business the gift of knowing your mission-critical business operations come first, with the bandwidth management, filtering, and reporting tools in our CyBlock Employee Web-use Security Solution.

CyBlock will help you and your IT team with:

  • Bandwidth Management
    • Uncover Web activity that can cause network slowdowns.
    • Spot spikes that could indicate excessive data use.
    • Identify which categories have the most visits triggering high bandwidth usage.
    • Pinpoint which bandwidth-intensive sites are being visited, hogging enterprise bandwidth, and potentially posing security risks.
    • Automatically throttle nonessential traffic by content category or group.
    • Stay informed with triggered alerts and real-time monitoring.
  • Web-use Filtering and Reporting
    • Limit the time users are online by the hour and day of the week.
    • Identify risk, and analyze usage of your network resources.
    • Configure policy exceptions for different users and groups.
    • Use white & black lists to restrict or allow access to certain sites.
    • Cover your main office, remote users, and branch offices.
    • Get complete, accurate, actionable, & compliance-ready reports.

Find ways to satisfy all your business and employee needs. Give your employees the gift of online shopping time during this holiday season, while making sure your IT team receives the gift of proactively throttling bandwidth for noncritical applications, getting alerts, and gaining visibility into bandwidth hogs.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud and guest Wi-Fi services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Things That Lie In Wait

November 1st, 2016

crocodile-small

There are many shows on cable today that portray instant recognition of a breach. To repeat what all others in the actual cyber industry say . . . not realistic.

Think of the scenario where an employee opens a file or accesses a malicious Web site. Step one is done. Nothing happens; the employee shrugs his or her shoulders and moves on. Nothing happened, so we are all good, right? Wrong. In reality, malware can happen behind the scenes with no visual effect at all at the time of being infected. The malware is just lying in wait. It either waits for an external signal–a preprogrammed time or until a specific action on the host computer is done. A hacker then would have access to look around, doing nothing noticeable, just checking things out . . . until the time that he finds what he wants.

Six months pass. All of a sudden, systems are breached, potentially causing loss of controls, data, or financial information. And no one knows where or how it happened until a thorough investigation finally points back to the past point in time.

It sounds unavoidable, right? No, it’s not unavoidable but the chances increase all the time that it will happen to your business. But if you take steps to protect and prepare as much as possible, the damage can be potentially avoided or at least somewhat overcome.

How? Here are 5 steps to try to avoid or quickly recover from a breach:

  1. BACK UP!!! Enough said. Think cloud, separate, secure, and frequent. Ransomware, a type of malware, takes over your files and holds them hostage. With a secure and separate backup, your business can go on operating.
  2. Train. Train your employees for anything that could happen. Teach them about current cyber threats; keep them informed. They can be considered an additional “firewall.”
  3. Use patch management. The days of worrying about how frustrating the changes will be from new updates are over. Patch consistently . . . because many of the patches today are security related and crucial to staying protected.
  4. Apply multiple layers of security. Your firewall will not protect you from a threat that originates internally. And yes, many happen using some form of an internal breach such as phishing and e-mails with malware links, or by way of privileged credentials whether internally or from a breach at a third-party contractor. Get a comprehensive employee Web-use security solution that will block access to malicious sites and links.
  5. Monitor. Watch it all. You will see trends, user behavior, and anomalies. Monitor network activity and the activity that accesses the Internet. Guest Wi-Fi networks, BYOD, and employee Web use should be included. Make sure you have visibility into what is going on with a solution that not only provides real-time monitoring, but also forensic-level detail reporting easily accessible by both IT and managers.

Overall, taking steps to ensure your business is protected is crucial, but know that you can still keep critical business operations functioning following any type of breach. Providing proactive solutions to protect, secure, and manage your business’s Web use in a cost-effective, agile, and customer-centric way is what we do. Let us help.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit http://www.wavecrest.net.

Is anyone listening?

October 13th, 2016

ball-563969_1280

What was your first reaction last year when hearing of the Cisco acquisition of OpenDNS? Many comments we have heard include . . . yup . . . “there they go again.” There are always transitions and changes within the business world, many of them positive. We all understand that. But the changes that can occur from these kinds of acquisitions can end up costing you, the customer or the partner, more than you signed up for. As an OpenDNS Umbrella customer, are you getting tired of riding the corporate wave until you eventually see all of the prior benefits to remaining a customer melt away? It usually takes about a year to kick in. We have seen it in other big acquisitions, and there is a consistent pattern of what happens.

We can make a difference for you. With a positive SMB mentality, Wavecrest strongly believes in one-on-one communication with our prospects, customers, and partners. When you reach out to us, we have a human being on the other end of the line who knows the product well, communicates well, and will take the extra step to help your enterprise and employees be more secure. You don’t have to go through automated calls, ticketing, or several levels of technical support to reach the person with the knowledge you need. For more than 20 years, we have been a hardworking, successful, customer-centric business, and we don’t plan on changing that for at least the next 20!

Wavecrest also has the products you require–agile and reliable solutions for your Web Security needs, ranging from software and hardware deployments to cloud and hybrid deployments. No matter your business size, industry, or distributed workforce, Wavecrest has a solution for you.

Don’t settle for a solution provider that isn’t listening to you. Let Wavecrest focus on your business and your specific requirements. Talk to us today.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use security management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services and guest Wi-Fi networks, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Find your bandwidth hogs and throttle them.

October 5th, 2016

pig-576329_1280

It has been a while since we talked bandwidth. Bandwidth usage seems to be one of those things that is now being taken for granted. We have ransomware and hackers to be concerned about! But beware! Hidden behind the assumption that you need as much bandwidth as possible to keep your business running is the secret streamer, daring downloader, and just plain old bandwidth hog.

Still potentially wreaking havoc on your mission-critical operations, bandwidth hogs can slow the whole business down. This could mean missed deadlines, late paychecks, productivity losses, and more.

What should you be looking for? In general terms, there are relatively easy signs.

  • Are you seeing bandwidth charge increases from your ISP?
  • Are you getting complaints from Internet-dependent staff like accounting or marketing?
  • Have you noticed certain times of day appearing slower on your network?
  • Do you run your guest Wi-Fi on your corporate network?

First off, run your guest Wi-Fi separately from your corporate network. This will add another layer of security protection for mission-critical operations. But remember, your business is still responsible for the guest Wi-Fi use even when it is run separately, so make sure you have a solution in place with a captive portal for your guest Wi-Fi network.

The most useful thing you can do if you answered “Yes” to any of the above questions is to get visibility. If you can’t tell where and when the bandwidth slowdowns are happening, then you are just throwing money in the air. Find an employee Web-use solution that will allow you to see trends and usage, and run detailed reports, so you can make informed decisions to control, throttle, and manage bandwidth usage. One of the best tools is being able to see bandwidth usage in real time, so make sure to find a solution that provides you with this important benefit.

Bandwidth may have moved a bit down on the importance list because of malware, ransomware, and data theft, but do not leave it off the list. It still has a huge impact on how your business operates daily. Find your bandwidth hogs and throttle them. You will see almost immediate improvements in workflow, efficiency, and frustration levels.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Are you making use of your data or just drowning in it?

September 29th, 2016

drowning-in-dataVisibility and accessibility have always been crucial to a business, but today, it is visibility and accessibility into critical data. You don’t have hours or days to dig through the data your company produces, and it is likely it produces a lot, much more than you think. Data rules our world today and will in the future even more. According to DN Capital, all of us combined are producing 10 million Blu-ray Discs’ worth of data daily–enough to stack as high as 4 Eiffel Towers!

Much of this data is produced by users, not automation. As a business owner, you know your employees produce data every time they are working on a computer or using their devices, especially when they are using the Internet. Even if you know and trust your employees, if you do not monitor this data, you are likely putting your business at risk. They aren’t to blame. Many smart and loyal employees today are being taken advantage of by very convincing cyberthieves. You need to protect your business, your data, and in turn, your employees!

Small business owners are realizing there is no option. Some form of Web-use security to protect all your business assets, including your data, has to be used. The hard part for a business without extensive IT departments or personnel is finding the right security solution, especially finding one today that allows you to truly organize, understand, and manage your data. One recommendation . . . all-in-one corporate-level solutions are not something that a small business will get true return on investment (ROI) from. The never-ending list of what is included just means you “bought a car with a Wi-Fi Hotspot feature” you will likely never use! Try to make sure and focus on what your true need is, see what is going on, and start from there.

Finding an employee Web-use security solution with comprehensive reporting and analytics will add that extra layer of visibility into data that a small business needs to focus on. You should be able to run comprehensive reports providing forensic-level detail information that allows you to review and easily understand what is going on from the mountains of data that your employees produce. Make sure you can monitor bandwidth usage, Acceptable Use Policy requirements, legal liabilities, cloud services usage, productivity, time online, and more. All of this is important to keep your business running smoothly and securely. And lastly, it is making use of the most valuable company asset you have, your data.

Get visibility and understand your data. Secure your business and protect your employees from today’s cyber threats. We can help.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

CyBlock/Cyfin Release 9.2.5 Now Available

September 26th, 2016

Release 9.2.5 contains many improvements to the Authentication Manager in CyBlock Appliance and CyBlock Software, specifically for Bypass Authentication. These changes should help with troublesome Web applications that fail to authenticate and reduce the number of prompts for authentication. In addition, enhancements were made to the installer interface, Interactive Reporting, and Logon Accounts. The enhancements are highlighted below.

  • Authentication Manager (CyBlock Appliance, CyBlock Software)
    • The sections on the Bypass tab have been renamed “Bypass List” and “Bypass Monitor.”
    • For the Bypass List:
      • Entries can now be filtered by URL/domain, user-agent, and count.
      • The way in which entries are loaded into the Bypass List from the Wavecrest URL List has changed.
      • URLs/domains and user-agents are consolidated when similar entries exist.
    • For the Bypass Monitor:
      • Entries can now be filtered by IP address, initial time, URL/domain, and user-agent.
      • A Tooltip now displays for long URLs/domains and user-agents, which are truncated.
      • The retention period for entries is now 10 minutes. If a URL is still in the list when the period expires, it is automatically deleted.
      • An entry is displayed in the Bypass Monitor after a set minimum time, and moved to the Bypass List when the count exceeds a set threshold and the set minimum time is exceeded.
  • InstallAnywhere Interface (CyBlock Directory Agent, CyBlock Software, Cyfin)
    • The installer has been updated with our latest product images providing a better look and feel.
  • Interactive Report Password (CyBlock Appliance, CyBlock Software, Cyfin)
    • Interactive Reporting has been enhanced to prevent users from inadvertently changing the password for the account for viewing interactive reports. Users need to contact their administrator if they have forgotten the report password.
  • Manager Access (CyBlock Appliance, CyBlock Software, Cyfin)
    • In User Management – Logon Accounts, the Operator role has been renamed “Manager” to more accurately describe the account user of the product.
  • Live Support
    • Chat assistance is now available in the full version of the product where you can talk to Customer Service or Technical Support over live chat. This feature is another way in which you can ask questions about our products.

There are also corrections in this release. To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

Interesting to watch, yes. Useful to you, the customer . . . resounding no.

August 24th, 2016

pillows fighting

When you watch two big companies argue, it tends to become interesting. We think so anyway! Zscaler pushes for cloud versus appliance benefits, while Forcepoint pushes back with Zscaler’s expensive, hidden costs with limited options. We admit they each get some points for effort. Why then do we watch with interest? Because Wavecrest tends to stay out of the fray with not only all the options you need for your distributed and unique workforce, but the pricing that will allow you to see ROI almost immediately.

Forcepoint definitely represents the changes that have happened since the Raytheon acquisition of Websense. Websense customers may very well be feeling some pinch this year since the acquisition’s changes are finally kicking in. Support or customer service people are hard to get a hold of. When renewal time comes around, the pricing, contract terms, or even the product lines have changed, and more. Hesitate before you sign on. You probably don’t need the entire package being pushed or to pay the add-on prices for things like SSL inspection or technical support that should already be included in the first place!

Zscaler, on the other hand, is on a mission to destroy the idea of hardware for your Web security. We disagree. A hardware option can play a critical role in the security of your business. In fact, our CyBlock Appliance is very popular and is consistently updated with new capabilities to protect your business against today’s always changing cyber threats — and the updates come at no additional cost to our customers!

Stop having to choose from limited options, or having to purchase more than you require because of all-in-one packages. Don’t get talked into believing that you are wrong to still want hardware instead of SaaS, or that you have to pay more for services or technical support you deserve. We have a solution and deployment that fits all workforce configurations. Purchase CyBlock Appliance and then add a remote office or roaming users. Great! CyBlock Hybrid will cover you. Purchase CyBlock Software and add another office in Italy? Grande! CyBlock Software is there for you without paying for an additional software license. Looking for a deployment requiring no hardware or software to buy and install, and no ongoing maintenance . . . CyBlock Cloud will be your solution.

Get involved in the process again. Become not just our customer but part of our family, knowing that we think of you first, listen, and react. You are our focus . . . not competing Goliaths or hardware bashers.

Wavecrest has cost-effective, comprehensive, agile, and reliable solutions for your employee Web-use security and analytics needs, ranging from software and hardware deployments to cloud and hybrid deployments–all with U.S.-based technical support included. No matter your business size, industry, or distributed workforce, Wavecrest has a solution for you. Leave the high prices and complicated contractual terms, hidden fees for technical support or product updates, and all the confusion (and arguing) behind. Let Wavecrest focus on your business and your specific requirements. Talk to us today.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services and guest Wi-Fi networks, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. Proud GSA contract holder for over 16 years and counting. For more information on the company, products, and partners, visit https://www.wavecrest.net.