Tag Archives: categories

Introducing Our Latest Update: Artificial Intelligence Category for Cyfin and CyBlock

At Wavecrest Computing, we are committed to continually improving our products to keep pace with the ever-evolving digital landscape. Today, we are excited to announce a significant enhancement to our Cyfin and CyBlock products – the introduction of a new category: Artificial Intelligence.

What is the Artificial Intelligence Category?

As AI technologies become increasingly integral to various aspects of business and daily life, we recognized the need to provide our users with more precise and relevant categorization. Our new Artificial Intelligence category encompasses websites that employ AI technologies such as machine learning and deep learning to deliver human-like services.

This category includes platforms offering:

    • Chatbots: Interactive AI-driven customer service tools.
    • Productivity Tools: Applications designed to streamline workflow and boost efficiency using AI.
    • Summarizers: Services that condense information into digestible summaries.
    • Transcription Services: Tools that convert audio or video content into written text.
    • No-Code Solutions: Platforms enabling users to build applications without programming knowledge, powered by AI.
    • Multimedia Editing: Advanced AI-driven tools for editing images, videos, and audio.

    Why This Update Matters

    AI technologies are not just a trend; they are reshaping industries and transforming how we interact with digital content. By introducing this category, we aim to:

    • Enhance Visibility: Provide detailed insights into how and when AI technologies are being utilized within your organization.
    • Improve Management: Help IT administrators and management teams better understand and control the use of AI-based tools and services.
    • Stay Current: Ensure that our product offerings are aligned with the latest technological advancements, offering you the most up-to-date solutions.

    How It Works

    The Artificial Intelligence category is meticulously designed to target sites that are actively hosting AI functionalities, rather than those merely providing information about AI. This distinction is crucial for organizations looking to manage and monitor the practical use of AI tools in their operations.

    By leveraging our advanced categorization technology, Cyfin and CyBlock can now identify and report on AI-driven activities more accurately, providing you with a clear view of how AI technologies are impacting your network.

    Continuous Improvement

    This update is part of our ongoing commitment to enhance our products and provide our customers with the best possible tools for managing and understanding their web traffic. We are dedicated to adapting to the dynamic digital environment and ensuring that our solutions remain relevant and effective.

    Stay tuned for more updates as we continue to innovate and expand our product capabilities. If you have any questions or need assistance with the new Artificial Intelligence category, our U.S.-based expert technical support team is always here to help.

    Experience the Future of Web Filtering and Reporting with Wavecrest Computing

    To learn more about our Cyfin and CyBlock products and how the new Artificial Intelligence category can benefit your organization, visit our website or contact our support team today.

    Analyze Your Encrypted Traffic With CyBlock SSL Inspection

    In huge numbers, more and more organizations, particularly e-businesses, are using Web-enabled applications that involve the use of personal, private, and sensitive data. Banking, online shopping, and credit card transactions are good examples, but by no means the only ones. SSL encryption is being increasingly used to protect the confidentiality of this business and personal data on the Web. Surveys show 25%-35% of enterprise traffic is SSL-encrypted, and the number can be as high as 70% in specific industries. SSL encryption is the most cost-effective way of protecting the privacy of this traffic.

    While SSL encryption solves many privacy-protection problems, it can allow traffic that poses security threats–both inbound and outbound–to pass through security protection measures uninspected and unchecked.

    Inbound Problem.  SSL encryption creates security blind spots in incoming traffic. The traditional security infrastructure that protects an organization is blind to the threats in inbound SSL traffic and provides an easy vehicle for criminals and hackers to hide their cyber attacks.

    Outbound Problem.  In addition to the risks of incoming threats hiding over SSL channels bypassing security protections, outbound enterprise traffic is now a growing problem. This is becoming quite a “hot button” for security applications (e.g., content filtering applications) that tackle data loss prevention (DLP), compliance reporting, and lawful intercept. In the past these solutions could see what was outgoing, but now they are suddenly “in the dark” when it comes to the data transferred over SSL.

    From a security standpoint, most organizations already deploy an array of network and security appliances and programs to protect their enterprise, enforce internal corporate acceptable use policies, and satisfy external government regulation. Unfortunately, in many instances, they can only inspect plaintext traffic and are unable to inspect HTTPS communications for attack signatures. This makes it difficult or impossible for network administrators to enforce corporate acceptable use policies or ensure threats, such as viruses, spam, and malware, are stopped before they reach individual users.

    In addition, without the ability to examine the contents of HTTPS communications, network administrators leave open the possibility for information to be accidentally leaked out of the enterprise or worse, stolen. Regulatory compliance requirements, including identifying accidental or intentional leakage of confidential information, are also virtually impossible to meet because of HTTPS encryption.

    CyBlock SSL Inspection gives network administrators the ability to monitor this SSL-encrypted traffic and to identify and respond to any undesirable content. The total HTTPS inspection process decrypts, analyzes, categorizes, and then re-encrypts the traffic. If necessary, specific standard and/or custom URL categories can be exempted from the inspection process; this is known as “tunneling.” In addition, full URL information in a number of Wavecrest audit reports is available to network administrators.

    To learn more about how CyBlock SSL Inspection can protect your sensitive data, please see our SSL Inspection Tech Brief or contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

    Source:  Examining SSL-Encrypted Communications – Netronome

    Enhanced Malware Protection

    Wavecrest Computing is pleased to announce an enhancement that delivers a tenfold increase in CyBlock’s ability to protect computer networks from malware and Cyfin’s ability to identify increasing security threats. Here is some background information.

    Malware is the scourge of the Internet. The term “malware” includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs that can disrupt computer operations, gather sensitive information, or gain access to private computer systems. For Wavecrest’s purposes, malware also includes Web sites that support hacking. Most malware originates and is spread from particular Web sites. Unfortunately, many thousands of such sites exist today, and to make matters worse, the number is growing steadily every day at distressingly fast rates.

    The malware problem is not new to Wavecrest. For a number of years, companies have been using CyBlock and Cyfin products to protect against and identify automated invasions of malicious scripts and software, and unauthorized access to their internal networks–the two major problems caused by malware. CyBlock provided protection–under customer control–by blocking and reporting on employees’ attempts to visit sites in 3 of more than 70 URL List categories: Hacking, Phishing/Fraud, and Spyware/Malicious.

    While this methodology was effective, it was not perfect. The difficulty lay in keeping the URL List up to date in the face of the relentless and rapid increase in the number of malware-spreading sites. This issue has been addressed with an enhancement that significantly improves the ability to keep the list current.

    At the same time, three related categories, Hacking, Phishing/Fraud, and Spyware/Malicious, have been consolidated into one called Malware. This consolidation increases the ease of administration for customers.

    This enhancement with its improved URL List is included in the latest release of CyBlock v.6.8.0 and Cyfin v.8.8.0. To realize its benefits as soon as possible, it is recommended that you upgrade your CyBlock or Cyfin product as soon as you can. Wavecrest will continue to update the enhanced list daily and make it available for download by customers. The download process remains unchanged.

    You can schedule the list to be downloaded automatically every day, or you can download it manually at any time. In any case, as soon as it is downloaded, you will immediately begin to receive the added protection and see a significant reduction in the number of security threats to which you may be exposed.

    To download the latest release, go to the Administration – Product Update screen in your CyBlock or Cyfin product. For additional assistance, please contact Technical Support at (321) 953-5351, Ext. 4 or support@wavecrest.net.

    Are the URLs in Your Categories Set Correctly?

    If you are upgrading your CyBlock or Cyfin product, you will be using the Wavecrest URL List 7. List 7 supports wildcard entries in domain, path, and parameter matching in URLs. In List 6, wildcard entries were possible, but limited, and thus, the URL matching was slightly different. Therefore, we recommend that you recheck and reset the URLs that were added to your standard and custom categories.

    To do this, go to the Advanced Settings – Category Setup – Edit URLs screen and select the category you want to change. In the Supplemental URLs or Custom URLs box, modify your URLs according to the List 7 rules. List 7 allows you to use the following wildcard rules to add multiple URLs simultaneously.

    1. Wildcards With Domain Matching.This URL matching method categorizes Web sites whose pages all contain the same type (category) of content, e.g., Shopping, News, and Sports. In these relatively simple cases, one category applies to the entire site. Under this method, if the Web log entries are in any of the following formats, and the URL List contains a matching URL, the product will categorize the visit on the basis of the domain name.
      • www.mydomain.com
      • *.mydomain.com
      • www.mydomain.*
      • *.mydomain.*


      Note:
       For this method to work, and as reflected in the examples, the entry in the URL List must contain a complete domain name element. That is, the domain name between the periods (dots) must be complete and must not be augmented with an asterisk or any other character. For example, the list must not contain mydomain*.com or *mydomain.com.

    2. Wildcards With Domain and Path Matching.This URL matching method categorizes Web site visit-attempts at the path level. This method enables individual pages to be categorized. If the URLs visited (as documented in the Web logs) are in any of the following formats and there is a corresponding entry in the URL List, the product will categorize the visit on the basis of the domain name and path.
      • www.mydomain.com/path/*
      • www.mydomain.com/*/path/*
      • *.mydomain.com/*/path/*
      • *.mydomain.com/path/

      Notes: For this method to work, the entry in the URL List must contain a complete path element. That is, the path element between the forward slashes must be complete and must not be augmented with an asterisk or any other character. For example, the list must not contain /path*/. As indicated at the end of the fourth example above, the asterisk is not always required, i.e., an exact path can be entered. However, as indicated in all four examples, forward slashes are always required.

    3. Wildcards With Parameter Matching.This method adds parameter matching to the two methods defined above (domain alone and domain-plus-path). It focuses more on syntax found in URL parameters than on content of the site being evaluated by the product. The parameter method works as follows. If the Web log entries are in any of the formats listed below, the product will categorize the visit on the basis of (a) the domain name plus the parameter, or (b) domain name plus path and parameter. Note that the first three bullets are examples of the former (no path included).
      • www.mydomain.com/*?keyword=value
      • www.mydomain.com/?keyword=value
      • www.mydomain.com/?id=*
      • www.mydomain.com/?id=*&sr=* (example of multiple pairs)
      • *mydomain.com/*/path/*?id=*

      Notes:  Parameter matching always requires the use of “?”. If a question mark is placed at the end of the domain or the path, the URL List will perform this matching method.The “/” is also required for this method. However the “&” is optional and is only needed when more than one “keyword=value” pairing is involved (as indicated above). Note that the “&” is added between pairs, and the pairs do not have to be in any particular order.

    For additional assistance, please contact Technical Support at (321) 953-5351, ext. 4 or support@wavecrest.net.