Advanced Employee Web Filtering and Monitoring Hybrid Deployment

Cover your distributed workforce with a local CyBlock install for office locations and CyBlock Cloud for remote and roaming users.

The CyBlock Hybrid Difference

Secure Web Content Filter

Secure Web Content Filter

  • Manage real-time Web traffic.
  • Optimized SSL Inspection.
  • Limit employees' time online.
  • Restrict or allow certain sites.

Virtual and Distributed Workforce

Virtual and Distributed Workforce

  • Highly elastic and adaptable.
  • Easily scale to all offices and users.
  • Fits today’s distributed workforce.
  • Perimeter-less Coverage.

Comprehensive Employee Reporting

Comprehensive Employee Reporting

  • Real Web browsing activity reports.
  • Deeper Level of User Activity Analysis.
  • Dramatically reduce time to analyze.
  • Customizable, interactive reports.
  • Accurately identify user clicks.

Policy and Compliance Management

Policy and Compliance Management

  • Ensure the human factor is managed.
  • Enforce Acceptable Use Policy.
  • Verify compliance to CIPA & HIPAA.
  • Continuous improvement process.
Hybrid Deployment Options

Hybrid Deployment Option

  • Supports CyBlock hardware and virtual environments.
  • Pair your local installation(s) of CyBlock with your cloud account.
  • Extend employee Web filtering and monitoring to your entire distributed workforce.

Easy Administration

  • Manage policies for all users from a single interface.
  • Policy enforcement from hotels, airports, home, or remote offices.
  • Easy to set up and manage.
Manage Policies For All Users From a Single Interface

Manage Policies For All Users From a Single Interface

Limit Employee Time Online

Advanced Employee Web Filtering

  • Apply a filtering schedule by day, hour, or half hour.
  • Configure policy exceptions for different users and groups.
  • Use white & black lists to restrict or allow access to certain sites.
  • Enable users to bypass a blocking action with coaching.
  • Enable the Safe Search feature in all browsers.
  • Block prohibited search terms from being searched.
  • Block based on the content type being accessed.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.

Smart Engine with Machine-Learning Analytics

  • Makes technical data easy to consume and manager-ready.
  • Analyzes large volumes of data over long periods of time.
  • Provides rapid and superior data insights.
  • Tags associate related domains with friendly names.
Machine-Learning Analytics

Machine-Learning Analytics

Sample Reports

Dashboard

Top Categories Trend by Visits

Trend - User Compare Visit Activity

Trend - Department by Bytes

Pie Chart - Top App/Site by Time

Pie Chart - Top Groups by Bytes

Top Chart - App/Site by Time Online

Top Chart - App/Site by Visits

Top Chart - User by Category Visits

Top Chart - Category by Groups Bytes

Top Table - App/Site by Time

Top Table - Cateory by Time

Top Table - User by Time

Top Table - Domain by Time

Table - User Audit Detail

Table - App/Site Audit Detail

Table - Audit - Search Terms

Table - Audit - Facebook by User Name

Table - Audit - Referer Link by Domain

Table - Audit - Bytes by Groups

View More
View Less
Active Directory Integration

Active Directory Integration

Active Directory Integration

  • Seamless AD integration.
  • Securely integrate AD Departments, Companies and Security Groups.
  • Easily provide admin or manager access via AD integration.
  • Limit manager access based their configured AD groups or departments.

Manage Employee Cloud Usage

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.
Manage Employee Cloud Usage

Manage Employee Cloud Usage

Manage Employee Cloud Usage

Advanced Threat Protection

Advanced Threat Protection

  • Keep out malware, Trojan horses, spyware, phishing attacks, and more.
  • Identify and stay ahead of a growing number of malware sites.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.
  • Prevent crashes, slowdowns, and information theft.

Employee Web-Use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.
Cloud Deployment Option

Cloud Deployment Option Example

Five Easy Deployment Options

  • Windows - Simple Windows Installer.
  • VMware - Easy-to-deploy virtual appliance.
  • Appliance Rack & Mini - Simple on-site turnkey solutions.
  • Cloud Service - Quick setup and low administrative costs.
  • Hybrid - Combines local and cloud benefits.

Even More CyBlock Hybrid Differences

Identify Human Action

Identify Human Action

  • See actual Web browsing activity.
  • All background clutter is removed.
  • Determine user time online.
  • Easily manage human factor.

Bandwidth Performance Management

Bandwidth Performance Management

  • Trigger alerts and throttle bandwidth.
  • Set byte usage threshold limits.
  • Cap or block nonessential bandwidth.
  • Identify bandwidth hogs in real time.

Threat Protection

Threat Protection

  • Secure Employee Web access.
  • Block malware and phishing sites.
  • Combat cybersecurity threats.
  • Inspect HTTPS traffic for malware.

Manager Access

Manager Access

  • Simple manager-ready reporting.
  • Deliver reports directly to managers.
  • Provide secure limited-access portal.
  • Easily collaborate and share reports.

Suggested Resources

Sign up for a custom CyBlock Hybrid Cloud demo.

Please keep me updated

Thank you! We will be in touch within one business day.

Once your request is processed, a product specialist will contact you to better understand your goals and schedule a custom product demo.

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

© Copyright 1996-2020 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2020 Wavecrest Computing. All Rights Reserved. | 877-442-9346
Facebook Twitter Linkedin Blog YouTube Knowledge Base