CyBlock - Secure Web Filtering Software

CyBlock provides advanced Web filtering, threat protection, comprehensive reporting, and more.

Secure Web Filter

Secure Web Filter

Enforce enterprise Web-security access policies.

  • Manage real-time Web-use traffic.
  • Secure employee Web access.
  • Optimized SSL Inspection.

Policy and Compliance Management

Policy and Compliance Management

Enforce usage & compliance policies.

  • Advanced Web Filtering.
  • Verify Acceptable Use Policy.
  • CIPA, HIPAA, & others.

Comprehensive Reporting

Comprehensive Reporting

Accurate, actionable, manager-ready reports.

  • Generate actionable Web-use reports.
  • Easily drill down to more detailed data.

Detailed Forensic Audits

Detailed Forensic Audits

Drill-down, comprehensive, employee Web-use Analytics.

  • Mitigate security issues.
  • Legal & forensic investigations.

Manage Cloud Services

Manage Cloud Services

Detect and analyze cloud services.

  • Discover all cloud services in use.
  • Identify risk, and analyze usage.
  • Block unapproved services.

Bandwidth Performance Management

Bandwidth Performance Management

Stop bandwidth hogs & optimize usage.

  • Throttle non-critical bandwidth.
  • Data usage threshold limits.

Threat Protection

Threat Protection

Stop malware & phishing attacks.

  • Block access to malicious sites.
  • Combat hyperlink threats.
  • Inspect HTTPS traffic.

Manager Access

Manager Access

Create reports on authorized groups without assistance from IT.

  • Easy-to-use, self-service access.
  • Ad-hoc Reporting.
Limit Employees' Time Online

Limit Employees' Time Online

Advanced Web Filtering

  • Configure policy exceptions for different users and groups.
  • Use white & black lists to restrict or allow access to certain sites.
  • Limit the time users are online by the hour and day of the week.
  • Enable users to bypass a blocking action with coaching.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.

Real-Time Monitoring

  • View Web activity in real time by user ID, URL, and its category.
  • View only specific users, groups, or categories.
  • Identifies bandwidth hogs in real time and provides trending.
  • Sends e-mail notification when bandwidth threshold is exceeded.
Real-Time Web Monitor

Real-Time Web Monitor

Real-Time Bandwidth Monitor

Real-Time Bandwidth Monitor

User Audit Report

User Audit Report

Search Terms Audit Report

Search Terms Audit Report

Detailed and Comprehensive Reporting

  • Complete view of every link a user clicks.
  • View all user searches and unacceptable visits.
  • Schedule reports for automatic delivery via e-mail.
  • Report formats include HTML, PDF, and CSV.

Manage Cloud Services

  • Discover all cloud applications being accessed in your organization.
  • Expose both corporate sanctioned and employee-introduced cloud services.
  • Identify risk, and analyze usage of your network resources.
  • Meet security and compliance requirements while safely adopting cloud services.
Manage Cloud Services

Manage Cloud Services

Manage Cloud Services

Advanced Threat Protection

Advanced Threat Protection

  • Keep out malware, Trojan horses, spyware, phishing attacks, and more.
  • Identify and stay ahead of a growing number of malware sites.
  • Inspect or “tunnel” HTTPS by Web site, category, or user ID.
  • Prevent crashes, slowdowns, and information theft.

Employee Web-use Behavioral Analytics

  • Expose abnormalities in user activity.
  • Identify potential insider threat behavior.
  • Flag possible legal liability issues.
  • Assess trends for data breach exposure.
  • Observe patterns for lost productivity.
Employee Web-use Behavioral Analytics

Employee Web-use Behavioral Analytics

Four Easy Deployment Options

  • Software - Easily adapts to your network.
  • Appliance - Simple on-site turnkey solution.
  • Cloud - Quick setup and low administrative costs.
  • Hybrid - Combining local and cloud benefits.
Cloud Deployment Option

Cloud Deployment Option Example

Why Us

  • Industry Leader Since 1996 – Stability, Experience, and Knowledge.
  • The Right Focus – Concentrating on User Behavior.
  • Best-of-Breed Products – Visibility, Compliance, Security, and Productivity.
  • Exceptional Support – Dedicated, Effective, and Responsive Support.
  • Best Value in Key Areas – Functionality, Price, Support, & Customer Service.
Why Us

Contact us about our complimentary bandwidth audit. Limited time offer.


System Requirements

  • Processor: 2 GHz
  • Memory: 4 GB RAM
  • Hard Disk: 500 MB free disk space depending on log file storage needs
  • Support Operating Systems:
    • Windows: Windows Server 2016/2012/2008/2003
    • Linux: Red Hat, Fedora, CentOS, and Ubuntu
      Note: Contact Wavecrest Technical Support for additional Linux support
    • Chrome OS 57

Technical Advantages

  • Active Directory Support. Synchronize CyBlock with AD.
  • Virtual Machine (VM) Support. Work in a VM environment.
  • Array Configuration. Manage multi-location configurations from one server.
  • Multi-Copy Support. Deploy multiple installations under 1 license.
  • Hybrid Cloud Option. Safeguard all employees in the organization.
  • Installation Options. Choose from multiple software installation approaches.
  • Support. Access our knowledgeable support staff and services for free.
© Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
LEGAL PRIVACY | © Copyright 1996-2017 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base