CyBlock Software - Secure Employee Web Filtering Software

CyBlock provides advanced Web filtering, threat protection, comprehensive employee reporting, and more.

The CyBlock Difference

Secure Web Content Filter

Secure Web Content Filter

  • Manage real-time Web-use traffic.
  • Optimized SSL Inspection.
  • Limit employees' time online.
  • Restrict or allow certain sites.

Policy and Compliance Management

Policy and Compliance Management

  • Ensure the human factor is managed.
  • Enforce Acceptable Use Policy.
  • Verify compliance to CIPA & HIPAA.
  • Continuous improvement process.

Smart Engine Analytics

Smart Engine Analytics

  • Technical data easier to consume.
  • Distinguishes between visits and hits.
  • Accurate time online calculation.
  • Clearly observe the human factor.

Comprehensive Employee Reporting

Comprehensive Employee Reporting

  • Actionable, pertinent Web-use reports.
  • Dramatically reduce time to analyze.
  • Customizable, interactive reports.
  • Discover all cloud services accessed.

Deeper Forensic-Level User Audits

Deeper Forensic-Level User Audits

  • Complete view of every link clicked.
  • See the exact search terms entered.
  • Easily segment user activity.
  • Reduce the time to analyze big data.

Bandwidth Performance Management

Bandwidth Performance Management

  • Trigger alerts and throttle bandwidth.
  • Set byte usage threshold limits.
  • Cap or block nonessential bandwidth.
  • Identify bandwidth hogs in real time.

Threat Protection

Threat Protection

  • Secure employee Web access.
  • Block malware and phishing sites.
  • Combat cybersecurity threats.
  • Inspect HTTPS traffic for malware.

Manager Access

Manager Access

  • Reporting-only self-service access.
  • IT controls portal access privileges.
  • Easily collaborate and share reports.
  • Easy-to-consume analytics.
Limit Employees' Time Online

Limit Employees' Time Online

Advanced Employee Web Filtering

  • Configure policy exceptions for different users and groups.
  • Use white & black lists to restrict or allow access to certain sites.
  • Limit the time users are online by the hour and day of the week.
  • Enable users to bypass a blocking action with coaching.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.

Smart Engine Analytics

  • Makes technical data easy to consume and manager-ready.
  • Utilizes precise algorithms to present accurate and up-to-date Web-use data.
  • Analyzes large volumes of data over long periods of time.
  • Feeds pertinent data to the reporting dashboards.
Smart Engine Analytics

Smart Engine Analytics

Industry-leading Reporting Tool

Key Features

  • Find clear, uncluttered detail based on user clicks vs. unsolicited traffic.
  • Easily drill down to more detailed forensic data with interactive reporting.
  • Schedule reports to run on your timetable.
  • Get customizable high-level and low-level charts and reports.
  • Output reports in print, PDF, and HTML formats.
Real-Time Employee Web-use Monitor

Drill-Down Reporting

Real-Time Employee Bandwidth Monitor

Easily Detect Anomalies

Dashboard

Dashboard

Top Categories Trend

Top Categories Trend

Dashboard Charts

  • Dashboard Home - Get a quick overview of your entire organization.
  • Top Users - Quickly discover which users had the most activity.
  • Top Time Online - Easily see how much time users are spending online.
  • Top Categories - Quickly find out which categories had the most activity.
  • Top Sites - Learn which sites had the most activity.
  • Top Bandwidth - Find out which users & sites are hogging bandwidth.

Hits vs. Visits

  • Most accurate visit algorithm in the industry.
  • Visits give you uncluttered, relevant Web activity detail based on user clicks.
  • Visits are a critical component to understanding human behavior.
  • Hits consist of unsolicited traffic and are not a reliable tracking metric on its own.
Category Audit Report

Top Users' Visits Bar Chart

Legal Liability Audit Report

Top Users' Visits Pie Chart

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Deeper Level of User Activity Analysis

  • Complete view of every link a user clicks.
  • See the exact search terms entered by users and their search time.
  • Determine how much time a user spends online.
  • Run an individual user report that details only Legal Liabilities Web use.
  • View Web content most frequently visited by a user.
  • Segment user activity by category acceptability classification.
Search Terms Audit Report

User Search Terms Audit Report

User Legal Liability Report

User Legal Liability Report

Real-Time Employee Web-use Monitoring

  • View Web activity in real time by user ID, URL, and its category.
  • View only specific users, groups, or categories.
  • Identifies bandwidth hogs in real time and provides trending.
  • Sends e-mail notification when bandwidth threshold is exceeded.
Real-Time Employee Web-use Monitor

Real-Time Employee Web-use Monitor

Real-Time Employee Bandwidth Monitor

Real-Time Employee Bandwidth Monitor

Employee Web-use Behavioral Analytics

Manage The Human Factor

Employee Web-use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.

Manage Employee Cloud Usage

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.
Manage Employee Cloud Usage

Manage Employee Cloud Usage

Manage Employee Cloud Usage

Advanced Threat Protection

Advanced Threat Protection

  • Keep out malware, Trojan horses, spyware, phishing attacks, and more.
  • Identify and stay ahead of a growing number of malware sites.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.
  • Prevent crashes, slowdowns, and information theft.

Four Easy Deployment Options

  • Software - Easily adapts to your network.
  • Appliance - Simple on-site turnkey solution.
  • Cloud - Quick setup and low administrative costs.
  • Hybrid - Combines local and cloud benefits.
Cloud Deployment Option

Cloud Deployment Option Example

What our customers are saying about CyBlock:

"CyBlock has helped my company improve productivity from our personnel by 60% since we implemented it's use within our network. This has been an invaluable tool that I'd recommend to anyone in need of filtering and blocking technology! Thank you Wavecrest"!

–Chris Warren The Five Star Institute

"CyBlock has for three years been a vital tool in our efforts to manage some 16,000 users' behaviour on the Web. Excellent functionality coupled with strong reporting capabilities has made our job much easier!"

–Jonas Sultan, AstraZeneca, Sweden

"We are pleased with the CyBlock product. We have been live with it for about 1 month now and find it to be useful for tracking our web usage. Yesterday I saw the activity light on our router flashing furiously so I ran an audit report and found out why by seeing which site(s) a couple of users were accessing."

–Phil Niles, Cottingham and Butler, Iowa

"Even though we have a full T1 at each location, I'd still say the benefit from more bandwidth is worth the cost of the software. I found out that one of my users downloaded a program that was hitting the Internet 9,000 times an hour. Needless to say that program has been removed."

–Roger Lewis, Northwest Bank and Trust, Iowa

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

System Requirements

  • Processor: 2 GHz
  • Memory: 4 GB RAM
  • Hard Disk: 500 MB free disk space depending on log file storage needs
  • Support Operating Systems:
    • Windows: Windows Server 2016/2012/2008/2003
    • Linux: Red Hat, Fedora, CentOS, and Ubuntu
      Note: Contact Wavecrest Technical Support for additional Linux support
    • Chrome OS 57

Technical Advantages

  • Active Directory Support. Synchronize CyBlock with AD.
  • Virtual Machine (VM) Support. Work in a VM environment.
  • Array Configuration. Manage multi-location configurations from one server.
  • Multi-Copy Support. Deploy multiple installations under 1 license.
  • Hybrid Cloud Option. Safeguard all employees in the organization.
  • Installation Options. Choose from multiple software installation approaches.
  • Support. Access our knowledgeable support staff and services for free.
© Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base