CyBlock Cloud - Effortless Integration With ConnectWise

CyBlock Cloud filtering service for MSPs provides ConnectWise integration for MSP Partners to easily manage licenses, analyze data, and protect customers from Web-borne threats.

The CyBlock Cloud Difference

Quick Launch Setup

Quick Launch Setup

  • Deploy in minutes.
  • No software to install.
  • No hardware required.
  • Simple, secure implementation.

Cloud-Based Web Filtering

Cloud-Based Web Filtering

  • Always-on filtering.
  • User/Group filter polices.
  • Time based exceptions by day/hour.
  • Block prohibited search terms.

Virtual and Distributed Workforce

Virtual and Distributed Workforce

  • Highly elastic and adaptable.
  • Easily scale to all offices and users.
  • Fits today’s distributed workforce.
  • Perimeter-less Coverage.

Save Money

Save Money

  • No need to purchase web gateway.
  • Reduce required admin time for IT.
  • Minimize infrastructure maintenance.
  • Swift and continuous ROI.
ConnectWise Integration

Set up ConnectWise Integration

Effortless Integration With ConnectWise

  • Quick and easy setup for ConnectWise and CyBlock integration use.
  • One click between ConnectWise and the CyBlock Cloud MSP Partner Portal.
  • No need for additional software installation.
  • Easily take advantage of ConnectWise service tickets and billing benefits.

Easily Track CyBlock Cloud Licenses

  • CyBlock will automatically populate new information into the ConnectWise interface.
  • Track & manage licenses, renewals, & more within your ConnectWise environment.
  • Increase new and recurring revenue and customer satisfaction.
Manage Employee Cloud Usage

Track CyBlock Cloud Licenses

Limit Employees' Time Online

Limit Employee Time Online

Advanced Employee Web Filtering

  • Apply a filtering schedule by day, hour, or half hour.
  • Configure policy exceptions for different users and groups.
  • Use white & black lists to restrict or allow access to certain sites.
  • Enable users to bypass a blocking action with coaching.
  • Enable the Safe Search feature in all browsers.
  • Block prohibited search terms from being searched.
  • Block based on the content type being accessed.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.

Real-Time Employee Web-Use Monitoring

  • View Web activity in real time by user ID, URL, and its category.
  • View only specific users, groups, or categories.
  • Identifies bandwidth hogs in real time and provides trending.
  • Sends e-mail notification when bandwidth threshold is exceeded.
Real-Time Employee Web-use Monitor

Real-Time Employee Web-use Monitor

Real-Time Employee Bandwidth Monitor

Real-Time Employee Bandwidth Monitor

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Manage Employee Cloud Usage

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.
Manage Employee Cloud Usage

Manage Employee Cloud Usage

Manage Employee Cloud Usage

Advanced Threat Protection

Advanced Threat Protection

  • Keep out malware, Trojan horses, spyware, phishing attacks, and more.
  • Identify and stay ahead of a growing number of malware sites.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.
  • Prevent crashes, slowdowns, and information theft.

Employee Web-Use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.
© Copyright 1996-2019 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2019 Wavecrest Computing. All Rights Reserved. | 877-442-9346
Facebook Twitter Linkedin Blog YouTube Knowledge Base