CyBlock - Secure Employee Web Filtering and Monitoring Suite

Software - Appliance - Mobile - Hybrid - Cloud

Secure Web Content Filter

Secure Web Content Filter

Advanced Employee Web Filter.

  • Manage real-time Web-use traffic.
  • Secure employee Web access.
  • Optimized SSL Inspection.
  • Limit employees' time online.
  • Restrict or allow certain sites.

Policy and Compliance Management

Policy and Compliance Management

Enforce usage & compliance policies.

  • Advanced Employee Web Filtering.
  • Verify Acceptable Use Policy.
  • CIPA, HIPAA, & others.

Comprehensive Employee Reporting

Comprehensive Employee Reporting

Accurate, actionable, manager-ready reports.

  • Generate actionable Web-use reports.
  • Easily drill down to more detailed data.

Manage Guest Networks

Manage Guest Networks

Protect your network from the potential risks associated with guest Wi-Fi.

  • Enforce your AUP for guests.
  • Control HTTP & HTTPS traffic.
  • Detect new devices with captive portal.

Manage Employee Cloud Usage

Manage Employee Cloud Usage

Detect and analyze cloud services.

  • Discover all cloud services in use.
  • Identify risk and analyze usage.
  • Block unapproved services.

Bandwidth Performance Management

Bandwidth Performance Management

Stop bandwidth hogs & optimize usage.

  • Throttle noncritical bandwidth.
  • Data usage threshold limits.

Threat Protection

Threat Protection

Stop malware & phishing attacks.

  • Block access to malicious sites.
  • Combat hyperlink threats.
  • Inspect HTTPS traffic.

Employee Behavioral Analytics

Employee Behavioral Analytics

Expose abnormalities in user activity.

  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Observe patterns for lost productivity.
Limit Employees' Time Online

Limit Employees' Time Online

Advanced Employee Web Filtering

  • Configure policy exceptions for different users and groups.
  • Use white & black lists to restrict or allow access to certain sites.
  • Limit the time users are online by the hour and day of the week.
  • Enable users to bypass a blocking action with coaching.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.

Industry-leading Reporting Tool

Key Features

  • Find clear, uncluttered detail based on user clicks vs. unsolicited traffic.
  • Easily drill down to more detailed forensic data with interactive reporting.
  • Schedule reports to run on your timetable.
  • Get customizable high-level and low-level charts and reports.
  • Output reports in print, PDF, and HTML formats.
Real-Time Employee Web-use Monitor

Drill-Down Reporting

Real-Time Employee Bandwidth Monitor

Easily Detect Anomalies

Dashboard

Dashboard

Top Categories Trend

Top Categories Trend

Dashboard Charts

  • Dashboard Home - Get a quick overview of your entire organization.
  • Top Users - Quickly discover which users had the most activity.
  • Top Time Online - Easily see how much time users are spending online.
  • Top Categories - Quickly find out which categories had the most activity.
  • Top Sites - Learn which sites had the most activity.
  • Top Bandwidth - Find out which users & sites are hogging bandwidth.

Hits vs. Visits

  • Most accurate visit algorithm in the industry.
  • Visits give you uncluttered, relevant Web activity detail based on user clicks.
  • Visits are a critical component to understanding human behavior.
  • Hits consist of unsolicited traffic and are not a reliable tracking metric on its own.
Category Audit Report

Top Users' Visits Bar Chart

Legal Liability Audit Report

Top Users' Visits Pie Chart

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Deeper Level of User Activity Analysis

  • Complete view of every link a user clicks.
  • See the exact search terms entered by users and their search time.
  • Determine how much time a user spends online.
  • Run an individual user report that details only Legal Liabilities Web use.
  • View Web content most frequently visited by a user.
  • Segment user activity by category acceptability classification.
Search Terms Audit Report

User Search Terms Audit Report

User Legal Liability Report

User Legal Liability Report

Real-Time Employee Web-use Monitoring

  • View Web activity in real time by user ID, URL, and its category.
  • View only specific users, groups, or categories.
  • Identifies bandwidth hogs in real time and provides trending.
  • Sends e-mail notification when bandwidth threshold is exceeded.
Real-Time Employee Web-use Monitor

Real-Time Employee Web-use Monitor

Real-Time Employee Bandwidth Monitor

Real-Time Employee Bandwidth Monitor

Employee Web-use Behavioral Analytics

Manage The Human Factor

Employee Web-use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.

Manage Employee Cloud Usage

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.
Manage Employee Cloud Usage

Manage Employee Cloud Usage

Manage Employee Cloud Usage

Advanced Threat Protection

Advanced Threat Protection

  • Keep out malware, Trojan horses, spyware, phishing attacks, and more.
  • Identify and stay ahead of a growing number of malware sites.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.
  • Prevent crashes, slowdowns, and information theft.

Four Easy Deployment Options

  • Software - Easily adapts to your network.
  • Appliance - Simple on-site turnkey solution.
  • Cloud - Quick setup and low administrative costs.
  • Hybrid - Combines local and cloud benefits.
Cloud Deployment Option

Cloud Deployment Option Example

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

© Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base