Advanced Forensic Log File Analyzer

Comprehensive. Actionable. Accurate. Helps you find relevant evidence faster dramatically reducing the time to analyze terabytes of log data.

Actionable, Relevant Evidence Faster

  • Relies on secure gateways for evidence.
  • Court-cited investigation platform.
  • Proven 20+ years' investigation history.
  • Trusted by large government and commercial organizations such as:
    • DOJ, Homeland Security, USPS OIG, and National Grid.
Reliable Forensic Audits

Reliable Forensic Audits

Managers Only See Actual User Web Browsing

  • Create custom reports that provide management with exactly what they need.
  • Accurately identify actual user clicks, providing managers with clear, useful data.
  • Reduce the volume of information by showing managers only relevant data.
  • True team collaboration is now possible with pertinent reports for all stakeholders.
Category Audit Report

Top Users' Visits Bar Chart

Legal Liability Audit Report

Top Users' Visits Pie Chart

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Deeper Level of User Activity Analysis

  • Complete view of every link a user clicks.
  • See the exact search terms entered by users and their search time.
  • Determine how much time a user spends online.
  • Run an individual user report that details only Legal Liabilities Web use.
  • View Web content most frequently visited by a user.
  • Segment user activity by category acceptability classification.
Drill-down Reporting

Drill-Down Reporting

Search Terms Audit Report

User Search Terms Audit Report

Most Popular Supported Devices

Palo Alto Networks
Check Point
Cisco Firepower

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

System Requirements

  • Processor: 2 GHz
  • Memory: 4 GB RAM
  • Support Operating Systems:
    • Windows: Windows Server 2016/2012/2008/2003
    • Linux: Red Hat, Fedora, CentOS, and Ubuntu
      Note: Contact Wavecrest Technical Support for additional Linux support
    • Chrome OS 57

Technical Advantages

  • Built-in Syslog Server. Directly connect syslog-enabled devices.
  • Active Directory Support. Synchronize CyBlock with AD.
  • Virtual Machine (VM) Support. Work in a VM environment.
  • Array Configuration. Manage multi-location configurations from one server.
  • Multi-Copy Support. Deploy multiple installations under 1 license.
  • Support. Access our knowledgeable support staff and services for free.
© Copyright 1996-2020 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2020 Wavecrest Computing. All Rights Reserved. | 877-442-9346
Facebook Twitter Linkedin Blog YouTube Knowledge Base