SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
www.wavecrest.net
WavecrestSolutionBrief®
Cyfin
Advanced Employee Web-Use Monitoring & Analytics
Wavecrest Computing Cyfin Solution Brief page 2
Introduction
In any enterprise, Internet abuse in the workplace is a common issue. With statistics showing that
employees are using the Internet during work hours for extensive personal and inappropriate use,
organizations need to better monitor the use of the Internet to increase productivity among employees.
Even as organizations try to control employee Internet abuse through the implementation of software
monitoring and Acceptable Use Policies (AUPs), studies have shown that employee Internet abuse
continues to cost companies money in terms of lost job productivity, increased turnover rates, and legal
liability.
Employee Internet Abuse Statistics
•	 30% to 40% of Internet use in the workplace is not related to business.
•	 64% of employees say they use the Internet for personal reasons during working hours.
•	 70% of all Internet pornography traffic occurs during the nine-to-five work day.
•	 A company with 1,000 Internet users could lose upwards of $35 million in productivity annually from
just an hour of daily Web surfing by employees.
•	 The 2014 FIFA World cup was estimated to have cost U.S. companies about $1.68 billion in lost
productivity.
How much visibility into employee Internet activity do companies really have? Do managers know
how productive their employees are during business hours? If the enterprise is not able to identify and
investigate employee Web activity, they risk employee productivity loss, legal liabilities, network security
threats, reduced enterprise bandwidth, and noncompliance. Without useful information in the form of
meaningful Web-use reports, the organization cannot determine whether their Acceptable Use Policy is
being violated.
Managers do not want to be surprised by network behavior they never knew existed. No manager wants
to be caught off guard by activity on Web sites they thought were blocked, high volumes of Web traffic, or
employees using the Web inappropriately. It is crucial that managers have access to a reporting solution
that allows them to analyze employee Web use so that they can easily identify instances of Web abuse
that can drain productivity, pose a legal liability threat, or threaten network security.
Overview of a Reporting Solution
There is no doubt that the enterprise needs access to information especially at the manager level. With
a comprehensive, easy-to-use reporting solution, the organization can delegate the responsibility of
keeping track of employee productivity to department managers. A manager portal that provides self-
service access is a viable solution where department heads are able to generate their own reports.
Managers would be restricted by groups and have access to only their departments, that is, they would
see only their employees.
Complete access to information would also include the ability to drill down in reports to obtain further
details, also known as interactive reporting. The reporting solution should allow managers to drill down to
the details of employee Web activity without needing assistance from the IT department. The reporting
solution should also allow easy scheduling of reports and provide distribution options, for example,
sending to an e-mail address or to a network or local directory for saving.
A highly effective reporting solution gives managers visibility into Internet activity. This is paramount when
accurate, actionable information is critical. The reporting feature should be able to produce meaningful,
Wavecrest Computing Cyfin Solution Brief page 3
manager-ready reports in the form of high-level summaries as well as low-level, detailed forensic
reports that can be used for audits, investigations of possible misuse of Web-access resources, forensic
investigations, personnel appraisals, and other corporate purposes.
The reporting solution should have the ability to categorize the enterprise’s Web activity so that
employees’ Web usage can be properly analyzed. The enterprise may also need categories, such as
cloud service categories, to have risk ratings so that use of low-risk categories or cloud services can be
encouraged. For cloud service categories, managers can then evaluate employee use of cloud services
by category and risk, identify all services in a category, and view detailed risk ratings of each.
Cyfin is a powerful, intuitive Web-use monitoring and analytics solution that matches these Web-reporting
requirements and gives you the Internet-usage reports you need. Some of the product’s features are
summarized below.
The Cyfin Solution
Logon Accounts
With Cyfin’s logon accounts feature, managers are given an operator account and are allowed to create
and view reports on authorized groups, generating their own reports without assistance from their IT
department. In this way, managers get easy, self-service access through the browser with an operator
account. Access can be restricted to their departments or groups so that they only see the Web activity of
their employees.
Interactive Reporting
In Cyfin’s interactive reporting, drill-down capability allows managers to quickly get URL detail. This is
available in both Dashboard charts as well as reports. Dashboard charts provide easy-to-analyze top and
trend charts of Web activity by visits, hits, or bytes for users, groups, categories, sites, and classifications.
You may drill down on the Top Users and Top Categories charts to get more detailed data on a specific
user and a particular category, respectively.
Drill down from Top Users Chart to User Audit Detail
Wavecrest Computing Cyfin Solution Brief page 4
In reports, detailed forensic information about the Web activity of specific users is available by clicking a
report’s elements. For example, from a high-level report, such as Site Analysis, you can click an ID Name,
and a User Audit Detail report will automatically begin running on the user.
Drill down from Site Analysis to User Audit Detail
Report Scheduling
Reports can be viewed ad hoc or scheduled for recurring automatic e-mail delivery on a daily, weekly,
or monthly frequency. You can specify multiple e-mail addresses of different recipients who will receive
the report. Scheduling reports securely delivers them to the right person or persons. Reports can also
be scheduled to run and be distributed to a directory by specifying a directory path. Scheduling reports is
easy and gives you distribution options to choose from.
Report Templates
With over 25 different report templates, Cyfin provides meaningful, manager-ready reports on all aspects
of Web use. At a high level, managers can run summary reports that depict visits within categories rated
as Acceptable, Neutral, or Unacceptable, users who visited sites in custom categories, visits by category,
users with the highest volume of activity, or Web sites that were most visited during a reporting period.
Cloud service activity can also be reported on, and at a high level, indicates by user the number of visits to
sites in cloud service categories.
At a low level, Cyfin offers a variety of detailed forensic audit reports that allow managers to get a
comprehensive analysis of a single user’s visits including the site’s category and full URL, view search
terms that users entered on popular search sites such as Google, view users who accessed sites that
pose a legal liability risk, and see specific URLs to which a user was denied. Other detailed audit reports
show the activity of all users in a single category that you select, activity associated with one or more Web
sites, or specific URLs of cloud services by user.
Wavecrest Computing Cyfin Solution Brief page 5
Report Selection Screen
URL Categorization
With 70-plus standard categories and an unlimited number of custom categories, Cyfin categorizes the
enterprise’s Web activity so that managers can analyze their employees’ Web usage. By also providing
a number of cloud service categories, Cyfin categorizes your cloud applications and services and allows
managers to assess their usage through cloud service reporting.
Summary
Visibility into employee Internet activity and easy access to the details of this information are vital to an
organization to curtail casual surfing, protect against security threats, conserve bandwidth, and enforce
the company’s AUP. Cyfin gives companies the ability to effectively monitor employee Internet usage.
Its Dashboard, summary, detailed, interactive, and scheduled reporting provides visibility, accountability,
and confidence in the product’s effectiveness. Cyfin empowers department managers with reporting
capabilities without reliance on their IT department, quickly supplying the accurate, actionable information
they need.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2016 Wavecrest Computing
Incorporated. All rights reserved.
About Wavecrest Computing
Since 1996, Wavecrest Computing has provided business and government clients with reliable, accurate
employee Web-access security, employee Web-use monitoring and analytics, and Cloud Access Security
Broker (CASB) solutions. IT specialists, HR professionals, and business managers trust Wavecrest’s
Cyfin® and CyBlock® products to manage employee Internet usage with today’s distributed workforce
in mind–reducing liability risks, improving productivity, managing cloud services, saving bandwidth, and
controlling costs.
Wavecrest has over 3,000 clients worldwide, including Blue Cross Blue Shield, MillerCoors, National Grid,
Rolex, Siemens, Superior Court of California, U.S. Dept. of Veterans Affairs, and a growing list of global
enterprises and government agencies. For more information on our company, products, and partners,
visit www.wavecrest.net.

Weitere ähnliche Inhalte

Was ist angesagt?

Deep dive into Salesforce Connected App
Deep dive into Salesforce Connected AppDeep dive into Salesforce Connected App
Deep dive into Salesforce Connected AppDhanik Sahni
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...Shane Emerson
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Paris Salesforce Developer Group
 
Salesforce Integration Pattern Overview
Salesforce Integration Pattern OverviewSalesforce Integration Pattern Overview
Salesforce Integration Pattern OverviewDhanik Sahni
 
Salesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce.org
 
Integration using Salesforce Canvas
Integration using Salesforce CanvasIntegration using Salesforce Canvas
Integration using Salesforce CanvasDhanik Sahni
 
Salesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic EventsSalesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic EventsDhanik Sahni
 
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...Ross Bauer
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera
 
Applications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsApplications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsManageEngine
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5ObserveIT
 
Cisp Payment Application Best Practices
Cisp Payment Application Best PracticesCisp Payment Application Best Practices
Cisp Payment Application Best Practicesguestcc519e
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleSalesforce Developers
 

Was ist angesagt? (17)

Deep dive into Salesforce Connected App
Deep dive into Salesforce Connected AppDeep dive into Salesforce Connected App
Deep dive into Salesforce Connected App
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Salesforce Integration Pattern Overview
Salesforce Integration Pattern OverviewSalesforce Integration Pattern Overview
Salesforce Integration Pattern Overview
 
Salesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce Security: Fully Automated
Salesforce Security: Fully Automated
 
Integration using Salesforce Canvas
Integration using Salesforce CanvasIntegration using Salesforce Canvas
Integration using Salesforce Canvas
 
Salesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic EventsSalesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic Events
 
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...
Meet Salesforce.com, Your New Employee: Automating Business Processes in the ...
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
B Reports English
B Reports EnglishB Reports English
B Reports English
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
 
Applications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsApplications performance Management For Enterprise Applications
Applications performance Management For Enterprise Applications
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5
 
Cisp Payment Application Best Practices
Cisp Payment Application Best PracticesCisp Payment Application Best Practices
Cisp Payment Application Best Practices
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 

Andere mochten auch

Stephen chiunjira-ted talk 16-nov_2014
Stephen chiunjira-ted talk 16-nov_2014Stephen chiunjira-ted talk 16-nov_2014
Stephen chiunjira-ted talk 16-nov_2014Stephen Chiunjira
 
itw confrence call-Q32005O riginal
itw confrence call-Q32005O riginalitw confrence call-Q32005O riginal
itw confrence call-Q32005O riginalfinance16
 
Da Tp 1 Desarrollo Y AdquisicióN De Software
Da Tp 1   Desarrollo Y AdquisicióN De SoftwareDa Tp 1   Desarrollo Y AdquisicióN De Software
Da Tp 1 Desarrollo Y AdquisicióN De Softwareguestdc453b
 
Caso de Estudio de SONY - HP Group - Online Marketing Factory Opinion
Caso de Estudio de SONY - HP Group - Online Marketing Factory OpinionCaso de Estudio de SONY - HP Group - Online Marketing Factory Opinion
Caso de Estudio de SONY - HP Group - Online Marketing Factory OpinionOnline Marketing Factory
 

Andere mochten auch (10)

La fabula de la gallina marcelina
La fabula de la gallina marcelinaLa fabula de la gallina marcelina
La fabula de la gallina marcelina
 
PNU_LeitaBoucicaut(2)
PNU_LeitaBoucicaut(2)PNU_LeitaBoucicaut(2)
PNU_LeitaBoucicaut(2)
 
Stephen chiunjira-ted talk 16-nov_2014
Stephen chiunjira-ted talk 16-nov_2014Stephen chiunjira-ted talk 16-nov_2014
Stephen chiunjira-ted talk 16-nov_2014
 
Study, Statistics & Fun Facts About Super Bowl 50
Study, Statistics & Fun Facts About Super Bowl 50 Study, Statistics & Fun Facts About Super Bowl 50
Study, Statistics & Fun Facts About Super Bowl 50
 
itw confrence call-Q32005O riginal
itw confrence call-Q32005O riginalitw confrence call-Q32005O riginal
itw confrence call-Q32005O riginal
 
Conducta responsable en investigación
Conducta responsable en investigaciónConducta responsable en investigación
Conducta responsable en investigación
 
Da Tp 1 Desarrollo Y AdquisicióN De Software
Da Tp 1   Desarrollo Y AdquisicióN De SoftwareDa Tp 1   Desarrollo Y AdquisicióN De Software
Da Tp 1 Desarrollo Y AdquisicióN De Software
 
Title 24
Title 24Title 24
Title 24
 
Delitos informaticos
Delitos informaticosDelitos informaticos
Delitos informaticos
 
Caso de Estudio de SONY - HP Group - Online Marketing Factory Opinion
Caso de Estudio de SONY - HP Group - Online Marketing Factory OpinionCaso de Estudio de SONY - HP Group - Online Marketing Factory Opinion
Caso de Estudio de SONY - HP Group - Online Marketing Factory Opinion
 

Ähnlich wie Cyfin Solution Brief

eBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPeBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPAbhishek Ranjan
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsWavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
Platform for Comprehensive Vendor Research & Analysis
Platform for Comprehensive Vendor Research & AnalysisPlatform for Comprehensive Vendor Research & Analysis
Platform for Comprehensive Vendor Research & AnalysisMike Taylor
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health CheckerIRJET Journal
 
APM for Enterprise WhitePaper from New Relic
APM for Enterprise WhitePaper from New RelicAPM for Enterprise WhitePaper from New Relic
APM for Enterprise WhitePaper from New RelicNew Relic
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICES
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICESBUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICES
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICESflaviusnoja1
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating SystemIRJET Journal
 
5 ways to better web governance in Local Government
5 ways to better web governance in Local Government5 ways to better web governance in Local Government
5 ways to better web governance in Local GovernmentShane Diffily
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsMike Taylor
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsMike Taylor
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized FirmsReadyTalk
 
Better Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsBetter Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsSidharthKumar13
 
Custom Web Application Development for Startup Founders.pdf
Custom Web Application Development for Startup Founders.pdfCustom Web Application Development for Startup Founders.pdf
Custom Web Application Development for Startup Founders.pdfBitCot
 
Web performance management
Web performance managementWeb performance management
Web performance managementriohackfor
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...kalichargn70th171
 

Ähnlich wie Cyfin Solution Brief (20)

eBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPeBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPP
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine Analytics
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
Platform for Comprehensive Vendor Research & Analysis
Platform for Comprehensive Vendor Research & AnalysisPlatform for Comprehensive Vendor Research & Analysis
Platform for Comprehensive Vendor Research & Analysis
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
APM for Enterprise WhitePaper from New Relic
APM for Enterprise WhitePaper from New RelicAPM for Enterprise WhitePaper from New Relic
APM for Enterprise WhitePaper from New Relic
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICES
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICESBUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICES
BUILDING SCALABLE AND ROBUST WEB APPLICATIONS: BEST PRACTICES
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
5 ways to better web governance in Local Government
5 ways to better web governance in Local Government5 ways to better web governance in Local Government
5 ways to better web governance in Local Government
 
Proxy
ProxyProxy
Proxy
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial Aspects
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial Aspects
 
Proxy
ProxyProxy
Proxy
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms
 
Better Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsBetter Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with Synthetics
 
Custom Web Application Development for Startup Founders.pdf
Custom Web Application Development for Startup Founders.pdfCustom Web Application Development for Startup Founders.pdf
Custom Web Application Development for Startup Founders.pdf
 
Web performance management
Web performance managementWeb performance management
Web performance management
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
 

Mehr von Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetWavecrest Computing
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityWavecrest Computing
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsWavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Wavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefWavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Wavecrest Computing
 

Mehr von Wavecrest Computing (19)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cyfin Solution Brief

  • 2. Wavecrest Computing Cyfin Solution Brief page 2 Introduction In any enterprise, Internet abuse in the workplace is a common issue. With statistics showing that employees are using the Internet during work hours for extensive personal and inappropriate use, organizations need to better monitor the use of the Internet to increase productivity among employees. Even as organizations try to control employee Internet abuse through the implementation of software monitoring and Acceptable Use Policies (AUPs), studies have shown that employee Internet abuse continues to cost companies money in terms of lost job productivity, increased turnover rates, and legal liability. Employee Internet Abuse Statistics • 30% to 40% of Internet use in the workplace is not related to business. • 64% of employees say they use the Internet for personal reasons during working hours. • 70% of all Internet pornography traffic occurs during the nine-to-five work day. • A company with 1,000 Internet users could lose upwards of $35 million in productivity annually from just an hour of daily Web surfing by employees. • The 2014 FIFA World cup was estimated to have cost U.S. companies about $1.68 billion in lost productivity. How much visibility into employee Internet activity do companies really have? Do managers know how productive their employees are during business hours? If the enterprise is not able to identify and investigate employee Web activity, they risk employee productivity loss, legal liabilities, network security threats, reduced enterprise bandwidth, and noncompliance. Without useful information in the form of meaningful Web-use reports, the organization cannot determine whether their Acceptable Use Policy is being violated. Managers do not want to be surprised by network behavior they never knew existed. No manager wants to be caught off guard by activity on Web sites they thought were blocked, high volumes of Web traffic, or employees using the Web inappropriately. It is crucial that managers have access to a reporting solution that allows them to analyze employee Web use so that they can easily identify instances of Web abuse that can drain productivity, pose a legal liability threat, or threaten network security. Overview of a Reporting Solution There is no doubt that the enterprise needs access to information especially at the manager level. With a comprehensive, easy-to-use reporting solution, the organization can delegate the responsibility of keeping track of employee productivity to department managers. A manager portal that provides self- service access is a viable solution where department heads are able to generate their own reports. Managers would be restricted by groups and have access to only their departments, that is, they would see only their employees. Complete access to information would also include the ability to drill down in reports to obtain further details, also known as interactive reporting. The reporting solution should allow managers to drill down to the details of employee Web activity without needing assistance from the IT department. The reporting solution should also allow easy scheduling of reports and provide distribution options, for example, sending to an e-mail address or to a network or local directory for saving. A highly effective reporting solution gives managers visibility into Internet activity. This is paramount when accurate, actionable information is critical. The reporting feature should be able to produce meaningful,
  • 3. Wavecrest Computing Cyfin Solution Brief page 3 manager-ready reports in the form of high-level summaries as well as low-level, detailed forensic reports that can be used for audits, investigations of possible misuse of Web-access resources, forensic investigations, personnel appraisals, and other corporate purposes. The reporting solution should have the ability to categorize the enterprise’s Web activity so that employees’ Web usage can be properly analyzed. The enterprise may also need categories, such as cloud service categories, to have risk ratings so that use of low-risk categories or cloud services can be encouraged. For cloud service categories, managers can then evaluate employee use of cloud services by category and risk, identify all services in a category, and view detailed risk ratings of each. Cyfin is a powerful, intuitive Web-use monitoring and analytics solution that matches these Web-reporting requirements and gives you the Internet-usage reports you need. Some of the product’s features are summarized below. The Cyfin Solution Logon Accounts With Cyfin’s logon accounts feature, managers are given an operator account and are allowed to create and view reports on authorized groups, generating their own reports without assistance from their IT department. In this way, managers get easy, self-service access through the browser with an operator account. Access can be restricted to their departments or groups so that they only see the Web activity of their employees. Interactive Reporting In Cyfin’s interactive reporting, drill-down capability allows managers to quickly get URL detail. This is available in both Dashboard charts as well as reports. Dashboard charts provide easy-to-analyze top and trend charts of Web activity by visits, hits, or bytes for users, groups, categories, sites, and classifications. You may drill down on the Top Users and Top Categories charts to get more detailed data on a specific user and a particular category, respectively. Drill down from Top Users Chart to User Audit Detail
  • 4. Wavecrest Computing Cyfin Solution Brief page 4 In reports, detailed forensic information about the Web activity of specific users is available by clicking a report’s elements. For example, from a high-level report, such as Site Analysis, you can click an ID Name, and a User Audit Detail report will automatically begin running on the user. Drill down from Site Analysis to User Audit Detail Report Scheduling Reports can be viewed ad hoc or scheduled for recurring automatic e-mail delivery on a daily, weekly, or monthly frequency. You can specify multiple e-mail addresses of different recipients who will receive the report. Scheduling reports securely delivers them to the right person or persons. Reports can also be scheduled to run and be distributed to a directory by specifying a directory path. Scheduling reports is easy and gives you distribution options to choose from. Report Templates With over 25 different report templates, Cyfin provides meaningful, manager-ready reports on all aspects of Web use. At a high level, managers can run summary reports that depict visits within categories rated as Acceptable, Neutral, or Unacceptable, users who visited sites in custom categories, visits by category, users with the highest volume of activity, or Web sites that were most visited during a reporting period. Cloud service activity can also be reported on, and at a high level, indicates by user the number of visits to sites in cloud service categories. At a low level, Cyfin offers a variety of detailed forensic audit reports that allow managers to get a comprehensive analysis of a single user’s visits including the site’s category and full URL, view search terms that users entered on popular search sites such as Google, view users who accessed sites that pose a legal liability risk, and see specific URLs to which a user was denied. Other detailed audit reports show the activity of all users in a single category that you select, activity associated with one or more Web sites, or specific URLs of cloud services by user.
  • 5. Wavecrest Computing Cyfin Solution Brief page 5 Report Selection Screen URL Categorization With 70-plus standard categories and an unlimited number of custom categories, Cyfin categorizes the enterprise’s Web activity so that managers can analyze their employees’ Web usage. By also providing a number of cloud service categories, Cyfin categorizes your cloud applications and services and allows managers to assess their usage through cloud service reporting. Summary Visibility into employee Internet activity and easy access to the details of this information are vital to an organization to curtail casual surfing, protect against security threats, conserve bandwidth, and enforce the company’s AUP. Cyfin gives companies the ability to effectively monitor employee Internet usage. Its Dashboard, summary, detailed, interactive, and scheduled reporting provides visibility, accountability, and confidence in the product’s effectiveness. Cyfin empowers department managers with reporting capabilities without reliance on their IT department, quickly supplying the accurate, actionable information they need.
  • 6. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2016 Wavecrest Computing Incorporated. All rights reserved. About Wavecrest Computing Since 1996, Wavecrest Computing has provided business and government clients with reliable, accurate employee Web-access security, employee Web-use monitoring and analytics, and Cloud Access Security Broker (CASB) solutions. IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage with today’s distributed workforce in mind–reducing liability risks, improving productivity, managing cloud services, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Blue Cross Blue Shield, MillerCoors, National Grid, Rolex, Siemens, Superior Court of California, U.S. Dept. of Veterans Affairs, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net.