Log Analysis Reporting Suite

Cyfin - Advanced Reporting for Palo Alto, SonicWall, Check Point, WatchGuard, Cisco, and many more.

Restricted Manager Access

Restricted Manager Access

Create reports on authorized groups without assistance from IT.

  • Easy-to-use, self-service access.
  • Ad hoc reporting.

Integrated Solution

Integrated Solution

Easily integrates with Palo Alto, Check Point, SonicWall, WatchGuard, and 100-plus more.

  • Directly connect Syslog devices.
  • Automatic log file detection wizard.

Comprehensive Employee Reporting

Comprehensive Employee Reporting

Accurate, actionable, manager-ready reports.

  • Generate actionable Web-use reports.
  • Easily drill down to more detailed data.

Detailed Forensic User Audits

Detailed Forensic User Audits

Drill-down, comprehensive, employee Web-use analytics.

  • Mitigate security issues.
  • Legal & forensic investigations.

Policy and Compliance Management

Policy and Compliance Management

Monitor usage & compliance policies.

  • Detailed Employee Usage Audits.
  • Verify Acceptable Use Policy.
  • CIPA, HIPAA, & others.

Monitor Cloud Services

Monitor Cloud Services

Detect and analyze cloud services.

  • Discover all cloud services in use.
  • Identify risk and analyze usage.
  • Expose unapproved services.
Dashboard

Dashboard

Top Categories Trend

Top Categories Trend

Dashboard Charts

  • Dashboard Home - Get a quick overview of your entire organization.
  • Top Users - Quickly discover which users had the most activity.
  • Top Time Online - Easily see how much time users are spending online.
  • Top Categories - Quickly find out which categories had the most activity.
  • Top Sites - Learn which sites had the most activity.
  • Top Bandwidth - Find out which users & sites are hogging bandwidth.

Hits vs. Visits

  • Most accurate visit algorithm in the industry.
  • Visits give you uncluttered, relevant Web activity detail based on user clicks.
  • Visits are a critical component to understanding human behavior.
  • Hits consist of unsolicited traffic and are not a reliable tracking metric on its own.
Category Audit Report

Top Users' Visits Bar Chart

Legal Liability Audit Report

Top Users' Visits Pie Chart

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Deeper Level of User Activity Analysis

  • Complete view of every link a user clicks.
  • See the exact search terms entered by users and their search time.
  • Determine how much time a user spends online.
  • Run an individual user report that details only Legal Liabilities Web use.
  • View Web content most frequently visited by a user.
  • Segment user activity by category acceptability classification.
Search Terms Audit Report

User Search Terms Audit Report

User Legal Liability Report

User Legal Liability Report

Manage Employee Cloud Usage

Monitor Cloud Services

Monitor Cloud Services

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.

Employee Web-use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.
Employee Web-use Behavioral Analytics

Manage The Human Factor

Restricted Manager Access

Manager Self-Service Portal

Manager Portal

  • Easy-to-use, self-service manager access.
  • Reporting-only access for managers and HR with manager accounts.
  • Managers create reports on authorized groups without assistance from IT.
  • IT manages portal access privileges.
  • Highly accurate, actionable, manager-ready reporting templates.
  • Ad hoc reporting.

Built-in Syslog Server

  • Directly connect Syslog-enabled devices.
  • No third-party Syslog server required.
  • Supports virtually all Syslog-enabled gateways and firewalls.
  • Easily create multiple Syslog servers.
  • Each Syslog server can support a different type of gateway or firewall.
Built-in  Syslog Server

Built-in Syslog Server

Most Popular Supported Devices

Palo Alto Networks
SonicWall
Check Point
WatchGuard
Cisco
Fortinet
Sophos

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

System Requirements

  • Processor: 2 GHz
  • Memory: 4 GB RAM
  • Hard Disk: 500 MB free disk space depending on log file storage needs
  • Support Operating Systems:
    • Windows: Windows Server 2016/2012/2008/2003
    • Linux: Red Hat, Fedora, CentOS, and Ubuntu
      Note: Contact Wavecrest Technical Support for additional Linux support
    • Chrome OS 57

Technical Advantages

  • Built-in Syslog Server. Directly connect syslog-enabled devices.
  • Active Directory Support. Synchronize CyBlock with AD.
  • Virtual Machine (VM) Support. Work in a VM environment.
  • Array Configuration. Manage multi-location configurations from one server.
  • Multi-Copy Support. Deploy multiple installations under 1 license.
  • Support. Access our knowledgeable support staff and services for free.
© Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base