Log Analysis Employee Web-use Monitoring and Reporting Suite

Advanced Reporting for Palo Alto, SonicWall, Check Point, WatchGuard, Cisco, and many more.

The Cyfin Difference

Smart Engine Analytics

Smart Engine Analytics

  • Technical data easier to consume.
  • Distinguishes between visits and hits.
  • Accurate time online calculation.
  • Clearly observe the human factor.

Integrated & Highly Scalable Solution

Integrated & Highly Scalable Solution

  • Compatible with all popular firewalls.
  • Industry's most scalable log analyzer.
  • Directly connect Syslog devices.
  • Automatic log file detection wizard.

Deeper Forensic-Level User Audits

Deeper Forensic-Level User Audits

  • Complete view of every link clicked.
  • See the exact search terms entered.
  • Easily segment user activity.
  • Reduce the time to analyze big data.

Manager Access

Manager Access

  • Reporting-only self-service access.
  • IT controls portal access privileges.
  • Easily collaborate and share reports.
  • Easy-to-consume analytics.

Smart Engine Analytics

  • Makes technical data easy to consume and manager-ready.
  • Utilizes precise algorithms to present accurate and up-to-date Web-use data.
  • Analyzes large volumes of data over long periods of time.
  • Feeds pertinent data to the reporting dashboards.
Smart Engine Analytics

Smart Engine Analytics

Category Audit Report

Top Users' Visits Bar Chart

Legal Liability Audit Report

Top Users' Visits Pie Chart

Hits vs. Visits

  • Most accurate visit algorithm in the industry.
  • Visits give you uncluttered, relevant Web activity detail based on user clicks.
  • Visits are a critical component to understanding human behavior.
  • Hits consist of unsolicited traffic and are not a reliable tracking metric on its own.

Dashboard Charts

  • Dashboard Home - Get a quick overview of your entire organization.
  • Top Users - Quickly discover which users had the most activity.
  • Top Time Online - Easily see how much time users are spending online.
  • Top Categories - Quickly find out which categories had the most activity.
  • Top Sites - Learn which sites had the most activity.
  • Top Bandwidth - Find out which users & sites are hogging bandwidth.
Dashboard

Dashboard

Top Categories Trend

Top Categories Trend

User Audit Report

User Audit Report

Category Audit Report

Category Audit Report

Detailed and Comprehensive Audit Reporting

  • Show activity by entire organization, groups, users, and categories.
  • Get accurate, actionable, manager-ready detailed reports.
  • Easily view the data from several angles and different perspectives.
  • Dramatically reduce the time to analyze your organization's Web use.
  • Comply with government and industry regulations such as CIPA and HIPAA.

Deeper Forensic-Level User Activity Analysis

  • Complete view of every link a user clicks.
  • See the exact search terms entered by users and their search time.
  • Determine how much time a user spends online.
  • Run an individual user report that details only Legal Liabilities Web use.
  • View Web content most frequently visited by a user.
  • Segment user activity by category acceptability classification.
Search Terms Audit Report

User Search Terms Audit Report

User Legal Liability Report

User Legal Liability Report

Restricted Manager Access

Manager Access

Manager Access

  • Scheduling and Distributing Reports:
    • Send easy-to-read reports directly to managers.
    • Reports are restricted to only the manager's defined group(s).
    • Easily distribute reports manually or schedule for automatic distribution.
    • Interactive capability allows managers to drill down without IT assistance.
  • Manager Self-Service Portal:
    • Reporting-only access portal for managers and HR.
    • Managers create reports on authorized groups without assistance from IT.
    • IT assigns and maintains manager portal access privileges.
    • Easy-to-read, manager-friendly, actionable dashboard.

Employee Web-use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.
Employee Web-use Behavioral Analytics

Manage The Human Factor

Manage Employee Cloud Usage

Monitor Cloud Services

Monitor Cloud Services

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate-sanctioned and employee-introduced cloud services.
  • Identify risk and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.

Built-in Syslog Server

  • Directly connect Syslog-enabled devices.
  • No third-party Syslog server required.
  • Supports virtually all Syslog-enabled gateways and firewalls.
  • Easily create multiple Syslog servers.
  • Each Syslog server can support a different type of gateway or firewall.
Built-in  Syslog Server

Built-in Syslog Server

Most Popular Supported Devices

Palo Alto Networks
SonicWall
Check Point
WatchGuard
Cisco
Fortinet
Sophos

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • Global Customer Base – Customers on every continent except Antarctica.
  • The Right Focus – Concentrating on The Human Factor.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, and Customer Service.
Why Us

System Requirements

  • Processor: 2 GHz
  • Memory: 4 GB RAM
  • Hard Disk: 500 MB free disk space depending on log file storage needs
  • Support Operating Systems:
    • Windows: Windows Server 2016/2012/2008/2003
    • Linux: Red Hat, Fedora, CentOS, and Ubuntu
      Note: Contact Wavecrest Technical Support for additional Linux support
    • Chrome OS 57

Technical Advantages

  • Built-in Syslog Server. Directly connect syslog-enabled devices.
  • Active Directory Support. Synchronize CyBlock with AD.
  • Virtual Machine (VM) Support. Work in a VM environment.
  • Array Configuration. Manage multi-location configurations from one server.
  • Multi-Copy Support. Deploy multiple installations under 1 license.
  • Support. Access our knowledgeable support staff and services for free.
© Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base