Safeguard Your Remote Employees With CyBlock Hybrid



Similar documents
Filtering and Identifying Web Activity by User Name

Prioritize Network Traffic With Bandwidth Management

Managing Web Application Authentication Problems

Wavecrest Certificate

Web-Access Security Solution

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Employee Web-use Monitoring at BNSF Railway

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Edge Configuration Series Reporting Overview

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Web Filter. SurfControl Web Filter 5.0 Getting Started Guide. The World s #1 Web & Filtering Company

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

Datasheet FUJITSU Cloud Monitoring Service

MS Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Open Networking User Group SD-WAN Requirements Demonstration Talari Test Results

Build Your Knowledge!

F5 Silverline DDoS Protection Onboarding: Technical Note

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

Copyright 2012 Trend Micro Incorporated. All rights reserved.

MS Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Configuration Information

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

MS 20337A: Enterprise Voice and Online Services with Microsoft Lync 2013

IBM QRadar Security Intelligence Platform appliances

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

C05 Discovery of Enterprise zsystems Assets for API Management

DEPLOYMENT ROADMAP March 2015

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Capturing Barracuda Web Filter Activity in Reports

Configuring Managing and Troubleshooting Microsoft Exchange Server 2010

VMware vcloud Air - Disaster Recovery User's Guide

Web Application Hosting Cloud Architecture

custom hosting for how you do business

Aggregate speed and availability optimize your business connectivity. Visit for more information. Protonyx Data Services,

Web Filter. SurfControl Web Filter 5.0 Getting Started Guide. The World s #1 Web & Filtering Company

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Websense Certified Engineer Web Security Professional Examination Specification

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Cyclope Internet Filtering Proxy. - Installation Guide -

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

How To Secure Your Business

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Cisco ISR Web Security with Cisco ScanSafe

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

OpenText Media Management Audit Module FAQ

Junos Space Virtual Control

IBM API Management Overview IBM Corporation

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

AV-18 Introduction of the GIS Integration

Best Practices for NetFlow/IPFIX Analysis and Reporting

USER EXPERIENCE: 5 ESSENTIAL MONITORING METRICS

Active Directory Services with Windows Server MOC 10969

IBM WebSphere Application Server Communications Enabled Applications

Easily deploy and move enterprise applications in the cloud

Cloud Services Catalog with Epsilon

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Challenge accepted: IBM Cloud onboarding & Upgrades to IBM Notes Browser Plug-in

VMware Workspace Portal Reference Architecture

CTERA Portal Datacenter Edition

Enterprise Vault.cloud Deployment Checklist

Secret Server Qualys Integration Guide

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Monitoring your cloud based applications running on Ruby and MongoDB

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Network Monitoring Comparison

Active Directory Services with Windows Server

Digital Advisory Services Professional Service Description Network Assessment

Centrify Cloud Connector Deployment Guide

Enterprise Phone Systems. The Complete Buyer s Guide

.trustwave.com Updated October 9, Secure Web Gateway Version 11.0 Hybrid Deployment Guide

PCI v2.0 Compliance for Wireless LAN

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

BT Unified Trading communication. The Future Delivered

AMANDA Managed Services Understanding the benefits of moving to the cloud

Mitel Performance Analytics

How To Secure Shareware Kiteworks By Accellion

The Netskope Active Platform

Dell InTrust Preparing for Auditing and Monitoring Microsoft IIS

VMware vcloud Air Networking Guide

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks

10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Duration: Five Days

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Enterprise Voice and Online Services with Microsoft Lync Server 2013

ETM System SIP Trunk Support Technical Discussion

Masters Project Proxy SG

.Trustwave.com Updated October 9, Secure Web Gateway Version 11.0 Amazon EC2 Platform Set-up Guide

Configuration Information

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

End-user Security Analytics Strengthens Protection with ArcSight

Transcription:

WavecrestTechBrief Safeguard Your Remote Employees With CyBlock Hybrid www.wavecrest.net

For organizations that are composed of a main office, branch offices, and remote and mobile users, there is a certain need to safeguard all networks and employees in the organization. Organizations want to apply the same Acceptable Use Policy (AUP), which is being enforced for on-premises employees, to remote employees. Along with a local installation of CyBlock Software or CyBlock Appliance, companies can also secure remote offices and mobile users using a Hybrid deployment of CyBlock. How the CyBlock Hybrid Deployment Works The Hybrid deployment is a feature that uses CyBlock Cloud to extend Web filtering and monitoring to your off-premises employees, that is, those connecting to the Internet from hotels, airports, home offices, or remote offices. It consists of two components, that is, a local CyBlock installation and CyBlock Cloud delivered as a service. Here is a summary of how the Hybrid deployment works. Install one of our enterprise-level CyBlock deployment options CyBlock Software or CyBlock Appliance. You will be provided with a CyBlock Cloud account. You pair your local CyBlock with your cloud account. When configuration changes occur in your local CyBlock, they automatically sync with CyBlock Cloud. The configurations that are synced include the following: Blocking policies Web search filtering Blocking message Groups and IDs Custom categories Remote employee Web traffic is routed to the CyBlock Cloud server where the policies are applied. On-premises employee Web traffic is routed to your local CyBlock within your network. All cloud Web activity details are transferred to your local CyBlock and removed from the cloud. Cloud Web activity details are aggregated with your local CyBlock providing a complete enterprise view. You can monitor the live Web traffic of your remote employees, i.e., cloud users, on the Real-Time Web Monitor. Dashboard charts show cloud Web activity for the top users, groups, categories, and sites, and provide trending. Reports can be run to further analyze the Web usage of your cloud users. Wavecrest Computing Safeguard Your Remote Employees With CyBlock Hybrid page 2

Below is an illustration of a Hybrid deployment using CyBlock Software. Hybrid Reporting CyBlock Hybrid With Local CyBlock Software In a Hybrid deployment, you have full access to CyBlock s reporting capabilities. These include monitoring live Web traffic, running reports, and viewing Dashboard charts on your cloud users. Real-Time Web Monitor The Real-Time Web Monitor displays the Web activity of your cloud users in real time. When your local CyBlock installation is paired with your CyBlock Cloud account, you can select the log data source of the Web traffic that you wish to view. You may select your cloud configuration or local CyBlock configuration. The cloud configuration selection shows as your pairing cloud server, for example, cloud.cyblock.com. When you select your cloud configuration and start the monitor, your cloud users and their traffic will appear on the monitor similar to users going through the local proxy. If you want to see the traffic of your on-premises or local employees, simply select CyBlock Software or CyBlock Appliance. For your information, messages are displayed if sync communication is temporarily stopped, your CyBlock installation and cloud account are unpaired, or the pairing cloud server is down for some reason. Wavecrest Computing Safeguard Your Remote Employees With CyBlock Hybrid page 3

Configuring the Real-Time Web Monitor for Cloud User Activity Reports Similar to the Real-Time Web Monitor, you can select the log data source of the Web traffic that you wish to run a report on. In this case, you may select your cloud configuration, local CyBlock configuration, or all configurations. Cloud log files are imported nightly similar to local logs, and reports would be current as of the previous day. To get a report with the current day s cloud data, you would perform a manual sync on the Settings - Hybrid screen, and then run the report for the appropriate time frame. You can verify that cloud log files have been transferred by accessing the Data Management - Log Data Source - Viewer screen. Creating a User Audit Detail Report for Cloud Users Wavecrest Computing Safeguard Your Remote Employees With CyBlock Hybrid page 4

Dashboard Charts Dashboard charts give you an overview of the Web traffic of your cloud users in several different ways. They show cloud Web activity for the top users, groups, categories, and sites, and provide trending for users, groups, categories, and denied and allowed traffic. Cloud Dashboard data resides on the cloud server which is polled to render the data on the charts. You may select your cloud configuration to view cloud user activity or local CyBlock configuration to view local employee activity. Summary Viewing Web Activity for Top Cloud Users CyBlock Hybrid offers a flexible Web security solution that combines your on-premises CyBlock installation with a CyBlock Cloud service. You can manage the policies for your on-premises and offpremises employees from a single interface. Cloud user activity can be viewed in real time, analyzed with high-level summary and audit detail reports, and assessed with Dashboard charts. Using CyBlock Cloud, the Hybrid deployment secures remote and mobile users so there is no need to route traffic back to the main office. You can free up local server bandwidth and be assured that Web filtering for these users is occurring in the cloud. Wavecrest Computing Safeguard Your Remote Employees With CyBlock Hybrid page 5

About Wavecrest Computing Wavecrest Computing has provided business and government clients with reliable, accurate Web-use management products since 1996. IT specialists, HR professionals, and business managers trust Wavecrest s Cyfin and CyBlock products to manage employee Internet usage reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors, New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. Copyright 2015 Wavecrest Computing Incorporated. All rights reserved.