CyBlock Cloud service is now in a service location near you!

cloud-computing-Global-e1431544496938-620x250

We are excited to announce that we are expanding our reach! We have always prided ourselves on providing premium service to our customers no matter where they are located but now, with our new Canada location and U.K. location, we can bring you improved and efficient access to CyBlock Cloud and CyBlock Hybrid services! Start covering your remote users or satellite offices, or move all your users to CyBlock Cloud! No matter what type of distributed workforce you have, we can help.

CyBlock Cloud provides all the agile and comprehensive capabilities of CyBlock with filtering, reporting, cloud services management, real-time monitoring, bandwidth management, threat protection, and more, all in a deployment requiring no hardware or software to buy and install, and no maintenance!

CyBlock Hybrid will give you coverage for your remote users and satellite offices while your main office is covered with an on-site CyBlock Software installation, both managed with one convenient administration console.

Find out more about our CyBlock Cloud and Hybrid deployments, and our new Canada and U.K. service locations by calling 321-953-5351, Ext. 3. Request a FREE TRIAL today!!

Ex-user credentials haunting your network?

insider_threat“Joe” left two weeks ago. Are his user credentials still appearing active? Maybe because IT is backed up on “offboarding?” Or, maybe they don’t even know he is gone yet!

According to a survey done by Lieberman Software, “More than 13% can still access a previous employers’ systems using their old credentials.” This means the information that “Joe” had access to as a privileged employee, is still available…to him…right now…from outside the company. And most likely, many have that access for a rather long period of time. “Almost 25% work in organizations that do not change their service and process account passwords within 90 days,” stated the Lieberman Software survey. In the days of paper, it didn’t seem to matter that an old employee’s name still showed as a project manager on a document. Nowadays, this can not only cause confusion, it can pose serious risks to the company’s data, network, and reputation. Most employees or contractors do not pose a threat, but it is that one that you may miss that will have access to material with devastating consequences. Kentucky.com reported the following example in 2014 on the sentencing of an ex-contractor gaining access to Toyota’s systems:  “…caused considerable downtime or loss of functionality with a number of systems, affecting Toyotasupplier.com the most, according to court documents. Several Toyotasupplier.com and internal applications did not work properly or shut down for hours, according to the affidavit.”

Many companies are so busy with other tasks and decisions, the simple cleanup of the obvious things go unnoticed. We all have so many different access points to so many different applications today, that keeping track ourselves is overwhelming, but IT has to keep track of everyone’s access. Communication is the number one task to protect a company from data loss or threat risk. Tell IT–they can’t purge the system and protect the company if they are not kept informed. Today, IT is one of the most important departments for the functionality, security… lifeblood…of an organization. They should be first on the list. With access to comprehensive monitoring and reporting tools, IT can run a investigative query on demand.

What needs to be done to help protect your privileged information and network no matter where your data is located? The following should be at the top of the list:

  1. Make sure your internal process of employee onboarding and offboarding has IT included at all levels.
  2. Make sure your corporate policy is understood and signed off on when an employee is hired and again when discharged.
  3. Confirm that this policy clearly informs all employees that their actions, while using company devices, are logged, monitored, and audited.
  4. Verify that all users, including contractors, have their own, unique login credentials.
  5. Validate that your IT procedures include all levels of employee information access, especially privileged accounts.
  6. Make certain a corporate policy for discharging an employee has immediate impact on any access for that employee, even one day could be detrimental.
  7. Do not forget about social media. Many view this as a harmless side effect of today’s business world. It is not harmless. A disgruntled employee can do serious damage to a company’s reputation through this ever-increasing communication channel. Access to the company’s social media needs to be regulated just like any proprietary corporate network.

Lastly, audit…audit…audit. Use a comprehensive monitoring tool with detailed, drill-down capability to analyze data on any activity. It is always good practice to regularly screen for activity on users who are no longer with the company. Investigate any missed credentials and correct the issue before data loss, malware intrusion, or simple unethical behavior, such as accessing and posting on the company social media sites, happens. This is the only way to ensure that all avenues were covered. Today, monitoring, filtering, and reporting solutions are no longer a luxury–they are a requirement.

Wavecrest Computing has been the recognized leader in Web Security for over 19 years with CyBlock and Cyfin Solutions. These scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, and Web security threats.

CyBlock/Cyfin Release 9.2.0.a Now Available

We recently released a new version of CyBlock and Cyfin. This release contains the following corrections:

CyBlock

  • Using Application Controls, allowed YouTube videos now load properly with secure YouTube connections.
  • When Safe Search and SSL Inspection are enabled, adult content is now properly blocked in Bing search results.

CyBlock and Cyfin

  • The Compress Reports for E-Mail report option now works when only one report is e-mailed.
  • On the Data Management – Report Database – Delete – Schedule screen, the correct message is displayed when the Enable option is selected.
  • Logon accounts are no longer limited to five accounts.

To see the full release notes for your product, visit our Web site or knowledge base.

If you are at version 9.0.5 or later, you can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

If you are at version 6.8.3.a or earlier, you can download the latest release by going to CyBlock Software Downloads or Cyfin Downloads. To upgrade CyBlock Appliance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

For additional assistance, please feel free to contact us.

Wavecrest, the leader in Web security, and Check Point have announced a partnership.

CF_Full_FWavecrest Computing, a leading global provider of advanced Web security solutions, and Check Point Software Technologies have announced a technology partnership.

Wavecrest’s Cyfin, along with Check Point log files, efficiently and accurately make for an easy-to-manage, cost-effective log file analyzer and reporter. This integration easily addresses collection and analysis of Web-use activity data by producing rapid, accurate, and actionable, manager-ready reports for audits, investigations, or distribution. Predefined reports, such as top users or sites, bandwidth, legal liability detail, and user audit detail, as well as the benefit for managers to run selected user reports by department, provide visibility into every aspect of enterprise Web-use activity. Learn more at: https://www.wavecrest.net

Wavecrest Computing announces CyBlock Hybrid’s new reporting features.

 

Wavecrest Computing announces new reporting features are now available in the CyBlock Hybrid deployment. Reporting features, Real-Time Monitor and Dashboard Charts, can easily be accessed for both your CyBlock Cloud and local  CyBlock configurations. This enhancement allows the customer to easily monitor and develop reports on users, both local and remote.

Use Real-Time Monitor to see remote users’ current Web activity, or use Dashboard Charts to check on- or off-premises Web traffic trending by users, groups, categories, or denied and allowed traffic. Run a report for management or an audit that can include cloud, local, or all configurations. The new features proactively increase your administration capabilities while reducing the time you spend on Web management tasks.

The CyBlock Hybrid deployment is used when an on-site CyBlock installation is paired with CyBlock Cloud to provide coverage of remote users with the convenience of local administration for all users. Contact us for more information today!

Constantly improving, developing, and enhancing to make your Web security more efficient, Wavecrest Computing has been the recognized leader in Web Security Solutions for over 19 years. Wavecrest’s scalable filtering and forensic reporting analysis product lines, CyBlock and Cyfin, are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, malware, and many other Web security threats.

Cloud Hybrid Reporting
CyBlock Cloud – Hybrid Report

 

Another exciting new enhancement from Wavecrest…Cyfin Automatic Log File Detection!

Wavecrest Computing is excited to announce a new enhancement to our Cyfin Log File Analyzer Solution, Automatic Log File Detection. This enhancement allows for the easy setup and import of log files by automatically analyzing and matching the closest suitable log file types. You no longer have to worry about making sure you select the correct log file type manually before importing. All you have to do is locate your log file and select. Cyfin Automatic Log File Detection will display a short list of matches with sample data in fields, allowing you to select from the list the best log file type ensuring you are getting the best match available.

Constantly improving, developing and enhancing, to make your Web security more efficient, Wavecrest Computing has been the recognized leader in Web Security Solutions for over 19 years. Wavecrest’s scalable filtering and forensic reporting analysis product lines, CyBlock and Cyfin, are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, Malware, and many other Web security threats.

automatic logfile analysis

CyBlock/Cyfin Release 9.2.0 Now Available

In Release 9.2.0, we are thrilled to announce the availability of reporting for your CyBlock Hybrid deployment. With this feature, you can monitor live Web traffic, run reports, and view Dashboard charts on your cloud users. Another CyBlock feature in this release is the ability to use Safe Search with YouTube to block adult content.

For Cyfin customers, log file detection is available to assist you in quickly creating a log file configuration. Cyfin will analyze your log files to determine the log file format for you. The enhancements are described below.

  • CyBlock Hybrid Reporting. The following features have been added:
    • When your local CyBlock installation is paired with your CyBlock Cloud account, the following occurs:
      • Cloud log files are imported nightly into the Report Database similar to your local logs.
      • Cloud log files are compressed when transferred.
      • A data configuration field is displayed on the following pages to allow you to view your cloud configuration, local CyBlock configuration, or all configurations if applicable.
        • Data Management – Log Data Source – Viewer
        • Data Management – Log Data Source – Revalidate
        • Data Management – Report Database – Import – Manual
        • Data Management – Report Database – Viewer
        • Data Management – Report Database – Delete – Manual
        • Real-Time Monitors – Web
        • Reports – Manager (all reports)
        • Reports – Dashboard (excluding Top Classifications, Top Coached, and Trend Classifications)
      • The cloud configuration is displayed as the pairing cloud server to which your local installation is connected, for example, cloud.cyblock.com.
    • Real-Time Web Monitor. The Real-Time Web Monitor displays the Web traffic of your cloud users. Messages are displayed if sync communication is temporarily stopped, your CyBlock installation and cloud account are unpaired, or the pairing cloud server is down for some reason.
    • Reports. Reports can be run to analyze the Web usage of your cloud users. Cloud reports are current as of the previous day. To get a report with the current day’s cloud data, you would need to perform a manual sync on the Settings – Hybrid screen, and then run the report. You can verify that cloud logs have been transferred by going to the Data Management – Log Data Source – Viewer screen.
    • Dashboard Charts. Dashboard charts show cloud Web activity for the top users, groups, categories, and sites, and provide trending for users, groups, categories, and denied and allowed traffic.
  • CyBlock Safe Search for YouTube. The ability to enable Safe Search for YouTube has been added. When Safe Search and SSL Inspection are enabled, adult content is blocked on YouTube regardless of its Restricted Mode setting.
  • Cyfin Log File Detection. The following features have been added:
    • On the Log Data Source Setup page, you have the option to manually select your log file type or have the system analyze your log files to detect the type.
    • If you choose “Analyze,” you can browse to locate a log file, and the analysis will display the closest matching log file types.
    • You can then select the log file type that is the closest match and continue the configuration process.
    • If no matching log file types are found, a link is displayed so that you can upload a sample log file to Technical Support for analysis.

There are also corrections in this release for CyBlock as well as Cyfin. To see the full release notes for your product, visit our Web site or knowledge base.

If you are at version 9.0.5 or later, you can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

If you are at version 6.8.3.a or earlier, you can download the latest release by going to CyBlock Software Downloads or Cyfin Downloads. To upgrade CyBlock Appliance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

For additional assistance, please feel free to contact us.

Can you see your enterprise shadow IT?

shadow-it-300x171Can you? It’s there…hidden on your employees’ devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly known as shadow IT. “There are an astonishing 10,000 cloud services available on the market today, which creates a growing problem for IT around Shadow IT as only 9.3 percent of those apps meet enterprise data, security and legal requirements, cloud security company Skyhigh Networks found in its Q1 2015 Cloud Adoption and Risk Report.” Corporations need to control their proprietary information, network, and Web security. While employees may be thinking they can get their job done faster, the corporation is thinking about threats. “The result is technologies that empower individuals and teams limit the organisation as a whole.”

There are several views for this, all valuable. From the employees’ view, they believe they are finding ways to be more productive and efficient by using technology that is easily accessible and likely, not costing the corporation anything additional. It is quick and easy and can get the job done before the IT department would even have a chance to look at a request form. So, why would the corporation be upset? Here’s why–unauthorized applications, or shadow IT, can cause serious risks, such as Malware, data loss, and other severe network security concerns. As the responsible party, IT needs to know what is happening, especially when it comes to the random unauthorized applications users are bringing into the network.

What can be done? Which view holds more importance? That depends on your organization but gathering the information to make that decision can be quick and easy. You need total visibility into Web use so you can find and analyze any potential shadow IT. Proactive, comprehensive reporting of all Web-use activity allows a full view of users’ activities. IT and management need to see detailed drill-down activity per user, per group, or per category, and determine if the “shadow” application is to be quarantined, or discover the application is actually useful to the organization as a whole and add to the acceptable applications list.

It is important to take into consideration the employees’ need to have access to useful and contemporary tools. No post, article, or news story can tell you what to do within your organization. Only you know what will best suit your environment. Try collaboration though, between users, management, and IT. The key is to find the most useful applications and move toward applications that work, with the best interest of the overall corporation at heart.

Wavecrest Computing has been the recognized leader in Web Security for over 19 years with CyBlock and Cyfin Solutions. These scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, and Web security threats.

CyBlock/Cyfin Release 9.1.8 Now Available

Release 9.1.8 provides our CyBlock Cloud customers with the ability to create additional administrator accounts that can log on to CyBlock Cloud and access all of its features. You are provided with five additional logon accounts, but can request more logon accounts from Sales. In this release, CyBlock Appliance, CyBlock Software, and Cyfin logon accounts will be notified via e-mail when their password is reset or when it is changed. Also for these products, the file name of report e-mail attachments will be in the format selected in Report Options.

For Cyfin customers, the new Check Point Syslog log file configuration allows you to easily use our built-in syslog server to manage your syslog data. For all products, the product Help has been enhanced to open to the window-level topic for the screen when you click the Help link. These as well as other enhancements are highlighted below.

  • Additional Admin Accounts. The following features have been added:
    • The ability to create five additional admin accounts is now available in CyBlock Cloud. Current cloud customers should contact Sales to change this number if necessary.
    • The Create Logon Account page allows you to create an additional logon (admin) account by entering an e-mail address. The additional administrator will receive an e-mail to log on and change the temporary password assigned by the system.
    • The Delete Logon Account page allows you to delete a previously created logon account. It shows the e-mail addresses for only the additional logon accounts, not the admin e-mail address tied to your customer account.
    • Cloud logon accounts will be notified via e-mail when their password is reset or changed.
  • Resetting Your Password. On the Logon page, when you click the “Forgot password” link to reset your password, you will receive an e-mail with a temporary password. Use this password to log on and change the temporary password for your account.
  • Changing Your Password. When you change your password on the Change Your Password page, you will receive an e-mail notifying you that your password was changed recently. Users should contact their network administrator if they did not initiate this change.
  • Report File Name Format. The file name format specified on the Report Options page is applied to report file names if “E-Mail” is selected for the report delivery when creating reports. Zipped files will contain reports with friendly file names, but will retain the UUID.zip format.
  • Check Point Syslog Log File Configuration. The Check Point Syslog log file configuration has been added to the drop-down field on the Select Log File Type screen. After selecting “Check Point Syslog” and clicking Next, the subsequent screen allows you to use the Cyfin Syslog Server.
  • Product Help. The product Help is context-sensitive so that when a user clicks the Help link in the product, the Help system opens to the window-level topic for the screen.
  • Pairing Cloud Server. On the Hybrid or Directory Agent Configuration page, the new Cloud Server field displays the pairing cloud server to which your CyBlock installation is connected. You may change this server if instructed to do so by Technical Support.

There are also corrections in this release for CyBlock as well as Cyfin. To see the full release notes for your product, visit our Web site or knowledge base.

If you are at version 9.0.5 or later, you can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

If you are at version 6.8.3.a or earlier, you can download the latest release by going to CyBlock Software Downloads or Cyfin Downloads. To upgrade CyBlock Appliance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

For additional assistance, please feel free to contact us.

Are you willing to stake your business’ success and security on another commercial buyout by a federal contractor?

buyoutWe have all heard about the Websense acquisition–Raytheon bringing Websense into the Raytheon Cyber Products fold. It is big news for a defense contractor like Raytheon to make such an acquisition in the commercial market. Many times though, this strategy of a government contractor getting into the commercial business world backfires. For current Websense customers, this risk would hurt you the most.

As a Websense customer, are you prepared to take this risk? Are you concerned that your business may not fit into the Goliath corporate mentality, or about the potential for government-level new pricing or contractual terms? These changes may happen faster than you think, or they may drag on forever with you never knowing what will come up or when.

With a positive SMB mentality, Wavecrest strongly believes in one-on-one communication with our prospects, customers, and partners.  When you reach out to us, we have a human being on the other end of the line that knows the product well, communicates well, and will take the extra step to get your enterprise and employees secure. You don’t have to go through automated calls, ticketing, or several levels of technical support to reach the person with the knowledge you need.

Wavecrest also has the products you require–agile and reliable solutions for your Web Security needs, ranging from software and hardware deployments to cloud and hybrid deployments. No matter your business size, industry, or distributed workforce, Wavecrest has a solution for you.

Leave the government contractor-level pricing, contractual terms, and confusion behind. Don’t become another ticket number. Let Wavecrest focus on your business and your specific requirements. Talk to us today.