Another exciting new enhancement from Wavecrest…Cyfin Automatic Log File Detection!

Tuesday, July 28th, 2015

Wavecrest Computing is excited to announce a new enhancement to our Cyfin Log File Analyzer Solution, Automatic Log File Detection. This enhancement allows for the easy setup and import of log files by automatically analyzing and matching the closest suitable log file types. You no longer have to worry about making sure you select the correct log file type manually before importing. All you have to do is locate your log file and select. Cyfin Automatic Log File Detection will display a short list of matches with sample data in fields, allowing you to select from the list the best log file type ensuring you are getting the best match available.

Constantly improving, developing and enhancing, to make your Web security more efficient, Wavecrest Computing has been the recognized leader in Web Security Solutions for over 19 years. Wavecrest’s scalable filtering and forensic reporting analysis product lines, CyBlock and Cyfin, are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, Malware, and many other Web security threats.

automatic logfile analysis

The all-in-one, enterprise class, Web Security hardware solution

Wednesday, April 29th, 2015

The all-in-one, enterprise class, Web Security hardware solution, CyBlock Appliance, now available with local logging and reporting, can be easily paired with a CyBlock Cloud account as a Hybrid deployment, extending Web filtering and monitoring to your off-premises employees!

applianceLGet instant real-time information and proactive, reliable control over your network’s Internet users. CyBlock Appliance, the leading, turn-key, gateway appliance solution for Web-access Security, provides ease-of-use setup, configuration, and management at your fingertips! And now, you no longer have to worry about any remote logging that would require an external server or appliance. CyBlock Appliance now supports local logging and reporting!

The benefits of CyBlock Appliance are many, and your administrative choices are extensive. With minimal time and effort, the Appliance is up and running. Choose to use the Appliance as a proxy to monitor all your selected HTTP/S traffic, or inline, “transparent” to add the control and monitoring of P2P, torrents, IM, and e-mail, as well as public access Wi-Fi areas. Either configuration gives you granular controls, drill-down reporting, filtering, real-time monitoring, bandwidth throttling, as well as reducing risks of malware and data loss–your options are endless. CyBlock Appliance will proactively support all your organization’s Web-use needs fast and efficiently, without the need for constant administration.

Remote or mobile users? Safeguard all networks and employees in the organization. Add CyBlock Hybrid! Using CyBlock Appliance and CyBlock Cloud, the Hybrid deployment secures your additional remote and mobile employees so there is no need to route traffic back to the main office. All policies are managed from a single interface and sync automatically. Free up local server bandwidth and be assured that Web filtering for these users is occurring in the cloud with CyBlock Hybrid!

For more information, visit: Wavecrest Computing

Filtering and Identifying Web Activity by User Name

Tuesday, September 2nd, 2014

Identifying Web Activity by User Name

When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web traffic flowing through its network by user name versus IP address for various reasons. Some of these reasons include curtailing casual surfing, protecting against security threats, and conserving bandwidth. Furthermore, a company’s Acceptable Use Policy (AUP) is usually based on user names and/or groups of user names. Therefore, the application that enforces and monitors the company’s AUP needs to identify Web activity by user name. IP addresses can be dynamic, and sometimes more than one employee can log on to a computer, and hence, more than one user name will be using the same IP address.

Many an IT administrator is tasked with ensuring that the company’s employees are going through
the proxy that is in place, so that Web activity can be monitored by user name. To get user names
and authenticate users, IT administrators can choose any of the proxy configuration options and
authentication methods described below.

Depending on the company’s preference, one proxy configuration option may be more favorable than the other. Here, we will discuss applying browser settings manually, pushing out group policies using Active Directory (AD), using a captive portal, and installing client software. We will also touch on the different ways that you can authenticate your Internet users using our CyBlock products.

Read more.

Dashboard Charting Now Available in CyBlock Cloud Service

Thursday, May 8th, 2014

The CyBlock Cloud service dashboard provides multi-perspective, high-level trend and bar charts. A number of these ‘quick-look’ displays depict Web-use activity trends from a variety of perspectives. Others compare activity between users, groups, content categories, and sites. The Dashboard’s easy-to-interpret charts provide an efficient way to quickly determine the amount and characteristics of Web activity and identify problems that may exist.

Dashboard Home
Get a quick overview of your entire organization’s Web activity.  Spot spikes in visits and bandwidth. Identify top users and most visited categories.

dashboardhome

Top Sites Visit Chart
Find out which ten sites had the most visits for the time period you specify.

topsitesvisits

 

Top Sites Bandwidth Chart
Find out which ten sites are consuming the most bandwidth for the time period you specify.

topsitesbandwidth

 

User Trend Chart
View Web-use visits, hits, or bytes over time for users, groups, categories, and acceptability classifications.

usertrend

 

Web Monitor
View Web activity in real time by user ID, the full clickable URL, and its category. Filter on users, groups, or categories to be displayed.

RTMWebResults

 

Wavecrest is excited to unveil our new product knowledge base.

Thursday, April 24th, 2014

This new knowledge base will provide immediate, 24/7 support to our global customer base. Customers will be able to quickly find the answers they are looking for. The knowledge base comes with an enhanced search tool that shows relevant results as you type, dramatically reducing the resolution time.

Our top-rated technical support staff will be continuously updating the knowledge base. Wavecrest’s technical support staff is committed to providing customers with the best possible product experience. This commitment to quality will ensure the knowledge base will always yield the highest quality results for our customers. Through the knowledge base, customers will also be able to access detailed product release notes, tech tips, and the Wavecrest blog.

Wavecrest is always striving to provide continuously improved, higher level customer support. We furnish our customers with more than just a ‘product’, we provide them with a long-term ‘package’ that combines a cost-effective product with free support services whose priority is equal to that of product design. These services are available during the free product evaluation period and remains throughout the product license term.

See what existing customers are saying about Wavecrest’s technical support team:

“The Wavecrest support engineers are always eager and responsive to assist with any technical challenges facing our network. They have truly made my support to our customer relatively seamless.” -David Scott, Lockheed Martin CITIC

“Any pre-sales questions we had were answered promptly, and Wavecrest’s technical support ranks in the top 5% of all technical support I have worked with in 29 years of being in IT.” -Karleen Carlson, IT Manager, Van Diest Supply Company

“I can’t say enough about the service we have received from Wavecrest in general. From the sales team working with us through the trial and purchase period, to the support team that has answered each of our ‘quirks’.” -Allen Lochamy, Atlanta Bonded Warehouse

“Wavecrest has the best support of any company out there. Their staff members are always courteous to work with and knowledgeable about their product – which is a rarity in this type of work.” -Chris Martin, A+ Computer Solutions

kb

Monitoring Internet Usage … From the IT Department

Tuesday, January 31st, 2012

During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.  The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content.

What were the most-visited categories by your employees during 2011?

Are you currently monitoring and/or blocking the existing Spyware/Malicious, Phishing/Fraud, Public Proxy, and Hacking categories to help protect your network?

Source: Commtouch

In today’s wired workplace, internet security and bandwidth consumption are top concerns for IT professionals while employee productivity and legal liability ail management and HR professionals.  As a major contributor to the Web-use management effort, IT typically becomes deeply involved in planning, testing, selecting, installing, and administering Internet monitoring software.  With the different departments playing a role in deciding on the best product to fit their vast needs, most are left without a solution.  Fortunately, Wavecrest’s products have been reviewed by our customers as meeting each role’s needs most effectively, offering manager-ready, easy-to-interpret reports that can be accessed without the IT personnel in addition to providing a robust, truly scalable IT-friendly remedy.

With Wavecrest Computing, customers have the insight needed to proactively monitor / block the notorious malicious sites based on custom categories, the Wavecrest Control List, and a real-time deep packet analysis process.  Plus, our 19 comprehensive templates provide a variety of summarized and detailed Web-use activity reports on users, groups, categories, sites, acceptability ratings, and bandwidth consumption.  Conveniently import your current Web Use Policy to easily customize or classify categories, implement abuse thresholding, and monitor employee productivity while our Administrator and Operator Accounts allow for non-IT personnel to create and obtain their role-specific reports.

While serving a diverse mixture of commercial businesses, industrial firms, government agencies, military units, educational institutions, and non-profit organizations since 1996, our products continue to present the most up-to-date, proactive coverage in line with the one factor that underlies all Web-use management issues, human online activity. Wavecrest’s managers and developers understand human resource management well and we use that knowledge to develop features that prevent productivity losses, legal liability problems, network issues, and unnecessary costs.

What’s Hogging Your Company’s Bandwidth? Causes for Slow Network Speed this Holiday.

Friday, December 2nd, 2011

If you haven’t noticed, online holiday shopping lasts well beyond Cyber Monday.  According to a ComScore report, after the 2010 holiday shopping season, more than 85% of Americans online visited a retail site in December of last year.  Employees shopping online at work are likely causing critical applications, like Voice over IP (VoIP) and video conferencing, to perform poorly if at all.  The last thing you and your company need is network latency or slowdowns due to non-work related online activity.  Many of our clients are seeing a spike in bandwidth usage from shopping websites and have quickly taken measures to filter browsing to that category.  Which sites consumed the most bandwidth for your company this month?  Determine what factors are impacting your network speed before you decide to purchase more bandwidth – an expense that could be avoided with the right tools and a bit of discipline.

With 19 different types of highly customizable employee Web-use reports, Cyfin Reporter offer insights as to which types of traffic consume the maximum volume throughout the workday.  Monitor, filter, and report over 500 million Web pages in 74 categories and set throttling thresholds for sites that are slowing your company’s Internet speed with CyBlock Proxy.  Now is the time to address your poor network performance, slow applications, and bandwidth congestion.

We’re so sure you’ll benefit from our solutions that we offer a free 30-day product trial. Both products provide quantified data to help IT personnel keep track of bandwidth utilization by users as well as by type of usage (appropriate versus not so appropriate). After you’ve downloaded our products, take advantage of the User Comparison Trend Chart to detect unexpected spikes that could indicate excessive bandwidth or Web use.  Then review your Top Sites Bandwidth Chart (example seen below) and find out which ten sites are consuming the most bandwidth or had the most hits or visits for the time period you specify.

Top Sites Bandwidth Chart

 

Top Sites Bandwidth Chart for both Cyfin and CyBlock

Online Holiday Shopping Can Cost Your Business More Than Time

Tuesday, November 22nd, 2011

Online Shopping Risks

Cyber Monday is no more – in an uncertain economy, post-Thanksgiving online holiday shopping has increased since coined in 2005 and now lasts for one month with more than 50% of all online spending taking place during working hours1.  What does this mean for your business?  A large decrease in employee productivity, a boost in bandwidth consumption, and one of the most popular times for cybercriminals to attack your secure data.

Lost productivity can mean big bucks for your company, reducing employee output to a mere 60%2.  A survey by CareerBuilder states that more than half of the 4,000 respondents polled intend on shopping online while at work with one third of those planning for more than one hour each day, in addition to the two typical hours daily already reported by respondents (time excludes lunch hour and scheduled breaks).  If you do not have a Web-use policy or Internet Acceptable Use Policy (AUP) in place, one is necessary to help report, monitor, and prevent employee Internet abuse in addition to protecting your company from legal liability.

Downloading malware is another risk as employees use the Internet for personal reasons. Spyware and malicious code are big threats to company networks as they can consume bandwidth and compromise security.  Recent studies show that company networks are being infected with spyware and malicious code most often through employees surfing the Web; with the holidays increasing that risk, these threats make it imperative for companies to enforce an AUP to protect their networks. Wavecrest Computing suggests that companies monitor and/or filter employee Web use in order to better protect themselves from security threats. In addition to the inherent risks associated with hacking your online security – loss of company reputation, destruction of company data, and the downtime employees face while systems are restored – the costs to mitigate attacks are extraordinary and rising each year.  This year, U.S. companies are expected to spend more than triple the costs spent in 20063.

To ensure these threats do not happen to your company this holiday season, run through our checklist and remember to check it twice!

  • Install all applicable system and program updates to avoid malware from infiltrating any system frailty that could have easily been patched with an update.
  • Create a Web usage policy and clearly communicate it to your employees.
  • Be cautious prior to clicking on links to different websites particularly those found on social networking sites as they’re often a hotspot for malware.
  • Avoid the use of pirated / illegal software as many contain malware.
  • Never open email attachments from unknown senders and make sure to scan attachments you do decide to download.
  • Make steps to consistently back up your computer in the case that malware wipes your hard drive clean.
  • Monitor servers and security devices 24x7x365 for security issues and require preventative actions be taken on security threats in real time – this is where we come in!

CyBlock can be set up to block Web access by categories and by hour so employees can access shopping sites on their lunch break or after hours. This approach can help sustain morale while minimizing the risks associated with online shopping.  With Cyfin, you can monitor employees’ Web use to ensure that Web-use policies are followed or that unwanted spyware or malware is not downloaded as a result.  Let us guide you to a safer, more reliable, robust security solution with exceptional support at an unbeatable price!

Sources:

1https://blog.comscore.com/2011/11/cyber_monday_work_computers.html

2 https://www.wavecrest.net/editorial/costsavings.html

3https://money.cnn.com/galleries/2011/technology/1107/gallery.cyber_security_costs/index.html?iid=EL

 

Check Out the New Report Guide to CyBlock and Cyfin Reports

Friday, September 3rd, 2010

If you are ever unsure about what a term or metric in a report means, check out our new Report Guide.  It includes key concepts and definitions to help you gain a better understanding of the data displayed and how combining different reports can get you the exact information you need.  The guide also includes a detailed list of every standard report with a description of the information provided in each.  Check out the report guide and bookmark it in case you ever need to refer to it in the future.  You can always find it on our Web site too under Support Documentation for your specific Wavecrest product.

Few Employers Have a Social Networking Policy in Place

Thursday, February 4th, 2010

A recent report by Manpower found that very few companies have policies regarding social networking use.  In fact, only 29% of US companies have a formal social networking policy in place.  Social networks are not only time wasters, but they can pose serious security risks or damage a company’s reputation if employees post confidential or harmful material about the company.  No matter what an employer’s stance is on social networking use in the workplace, it is highly recommended to have a policy in place and educate employees on that policy. Joseph P. Paranac, a shareholder in LeClairRyan’s Labor and Employment Group has offered Web-use policy suggestions on what companies should include.

If you’re unsure whether or not you want to block social networking, we have also written a paper that addresses the issues surrounding social networking use in the workplace, the importance of creating a policy, and monitoring or filtering employee’s Web use according to that policy.

White Paper: Social Networking or Social Not-working?

Source: https://www.emarketer.com/Article.aspx?R=1007493