SlideShare a Scribd company logo
1 of 7
Download to read offline
www.wavecrest.net
Wavecrest®
TechBrief
Reporting Types and Smart Engine
Analytics
Wavecrest Computing Reporting Types and Smart Engine Analytics page 2
Introduction
In order to keep enterprise networks secure and operating efficiently, organizations need to have
clear visibility into the Internet traffic traversing their networks. IT personnel need access to real-time
information related to employee Web use and the health or performance of the network. Managers and
HR personnel are more concerned with human behavior in the workplace and want data related to high
Internet activity as well as the details of and patterns in employee Web use. They and other users, such
as forensic investigators, may need more analytical, precise information related to visited sites, user
names, time spent online, and content categories, spanning a long period of time.
One issue that organizations face is that the right information is not getting to the right people in the
right format. That is to say, managers who may want to address productivity issues with employees,
based on their Internet use or abuse, do not have the information in an easy-to-read and actionable
format. They may not even have reporting access to their department’s Web activity whether through
data visualizations such as charts, e-mailed reports, or a manager portal. Another issue is that if there is
reporting on Web traffic in the organization, it may be inadequate in showing relevant human behavior in
the workplace. Without knowing the human behavior in the organization, management is unable to define
what is normal and flag anomalies that may indicate insider threats, that is, human actions, whether
unintentional mistakes or malicious acts, that threaten data security. They are also unable to detect trends
in workforce productivity or determine whether an employee is in compliance with corporate policy.
Reporting dashboards and reporting engines provide several benefits for IT staff, administrators,
managers, HR personnel, and other users. They can provide specific information to a specific audience
in the company, increasing efficiency and productivity. These reporting tools can be used for analysis of
human behavior and system health which allows companies to manage and control employee Internet
use as well as network performance and security. They can be customized to offer different types of
analyses for different users and therefore serve different purposes. They comprise different reporting
types such as Operational, Strategic, and Analytical reporting. Reporting engines, also called Smart
Engines, feed the data to these tools and provide the analytics necessary for accurate, actionable
reporting. Reporting types and Smart Engines are discussed below.
Reporting Types and Smart Engines
Operational reporting shows activity that is happening now and is based on real-time data. With this
reporting type, IT can monitor current employee Web activity and system performance, and the data is
updated frequently. Operational reporting components are designed to be viewed multiple times during
the day.
Strategic reporting provides information at set time frames, and its individual visualizations, such
as dashboard charts, are updated on a recurring basis at less frequent intervals. In relation to key
performance indicators or metrics, Strategic reporting can show a snapshot of top consumer Web activity
with interactive visualizations providing the details.
Analytical reporting shows patterns of activity over time as well as comparisons of Web traffic occurring
in specific time frames. Its data visualizations may consist of trend and comparison charts as well as
detailed audit reports, allowing you to analyze large volumes of Web activity data for long-term audits and
forensic investigations.
Reporting engines provide the analytics for all reporting types, ensuring that companies have adequate
information to manage and control employee Web use. Smart Engine analytics affords detailed analysis,
Wavecrest Computing Reporting Types and Smart Engine Analytics page 3
permitting the investigation of trends, policy violation, Internet misuse, and ultimately, human behavior.
For companies struggling to address the human factor of cybersecurity, the Smart Engine is a necessity to
get the best possible insight into the security issues affecting the IT environment and the human behavior
occurring in the workplace.
To support your Web-use reporting needs, Wavecrest provides customized reporting capabilities to
supply different audiences in the company with information specific to their needs. The organization can
then observe normal human behavior and detect anomalies with the availability of dashboard charts,
metrics, reports, and Smart Engine analytics. The company also saves time and money by serving
dashboards, reports, and metrics from an easy-to-use portal. Most importantly, with Smart Engine
analytics, the Smart Engine catches what you might miss with large volumes of data and allows you to
identify issues faster.
Wavecrest’s Reporting Capabilities
While one audience may have specific Web-use data needs, there will be overlap in the types of Web-
use reporting tools best suited for that audience. The important thing is that that audience’s questions are
being answered by the reporting tools to drive decisions and actions, that is, the right information is getting
to the right people.
Operational
Operational reporting covers two areas: real-time employee Web-use metrics and real-time system
metrics--pertinent information for IT personnel. With real-time employee Web-use metrics, IT can monitor
Web activity in real time by user, URL, and content category. IT personnel can also monitor the employee
bandwidth consumption in the enterprise. Based on an established threshold, bandwidth can be
throttled using a content category control policy or a group control policy. Alerts are triggered and e-mail
notifications are sent when thresholds are reached. Real-time employee Web-use metrics give a real-
time running display of the browsing behavior of employees, that is, current user activity, and identifies
bandwidth hogs in real time.
Real-Time Employee Web-Use Metrics
With real-time system metrics, IT personnel can monitor the health status of different aspects of the
system. These include the overall status of the application server, system information such as memory,
disk utilization, and number of threads, the validity of all log file data, the success of imported log files, jobs
queued for processing, and product event errors and messages on various processes such as scheduling
reports and importing data.
Wavecrest Computing Reporting Types and Smart Engine Analytics page 4
Strategic
Strategic reporting summarizes performance over set time frames, for example, last week or last month.
This data may be of interest to managers and HR personnel as well as IT staff. Dashboard Top charts
depict Web use for the top users, groups, categories, classifications, and sites in the enterprise. With
these interactive visualizations, management can quickly discover and track which users, categories,
or sites had the most activity, how much time users are spending online, and so on. With drill-down
capability, these charts can provide the details of user Web activity for audits and investigations.
Top Users Chart
Analytical
Analytical reporting shows trends in data over time as well as comparisons of Web activity. This data may
be of interest to managers and HR personnel. Dashboard Trend charts depict Web activity for a selected
user, group, category, or classification, or traffic data in hourly or daily increments for a predefined date
range, such as Yesterday, Previous 24 Hours, and Last 7 Days. Data can also be viewed for custom date
ranges. Trend charts also allow you to compare the Web traffic for a set date range with that of a previous
period to detect any anomalies in Web activity.
Wavecrest Computing Reporting Types and Smart Engine Analytics page 5
Top Categories Trend Chart
Also included as part of Analytical reporting are categorized audit reports that deliver a comprehensive
analysis of user activity including their visits, search terms, and inappropriate sites. These low-level audit
reports allow you to get a detailed analysis of a single user’s visits including the site’s category and full
URL, view search terms that a user entered on popular search sites such as Google, and see specific
URLs to which a user was denied. They can be quickly run as ad hoc reports saving you time in your audit
or investigation.
Smart Engine Analytics
Smart Engine analytics provide the data for Wavecrest reporting. With its precise algorithms, the Smart
Engine is used by charts and reports to present accurate and up-to-date Web-use data. The Smart
Engine utilizes algorithms that perform functions such as determining visits, user names, and time online
from Web traffic, and categorizing URLs into logical groups based on content. Without the Smart Engine
and its analytics, the reporting components could not provide the adequate information that your company
needs to manage employee Web use. The Smart Engine makes technical data usable and manager-
ready. Examples of its algorithms are discussed below.
The differentiation between Web traffic hits and visits is of paramount importance for companies that
want to manage the human factor. True visits are actual user clicks that do not include multimedia URLs,
such as graphics, audio Web pages, advertisements, or Web pages that were requested as part of a visit,
that is, unsolicited. By identifying the content of each URL, the Wavecrest Visit algorithm distinguishes
between these user clicks and the unsolicited traffic, i.e., hits. The organization can then get a true,
meaningful picture of the level and type of Web activity occurring in the network.
When Web filtering and reporting products do not include user names in Web traffic records, user
Web activity is lost and unaccounted for. The company may not even know that this is occurring. The
Wavecrest User Name Caching algorithm uses the cache user name if available, versus the IP address,
allowing you to capture all activity of the user and get more detailed data in reporting.
When users are online, that is, on the Internet, they could be reading a Web page, performing another
task in a different application with the browser open, or possibly away from the computer entirely with
Wavecrest Computing Reporting Types and Smart Engine Analytics page 6
the browser open. The Wavecrest Time Online algorithm uses a highly accurate priority method for
calculating users’ time online. Managers and IT administrators can quickly see which users, categories,
sites, and so on had the most volume of activity and address any potential issues, such as productivity
loss, bandwidth slowdowns, and policy noncompliance.
The Wavecrest Categorization algorithm is designed to report on all Web activity. With a number of
standard and cloud service categories and an unlimited number of custom categories, the Categorization
algorithm categorizes the organization’s Web activity so that managers can analyze their employees’ Web
usage. Custom categories allow additional monitoring where you can create a white list for more tailored
reports so that custom URLs are included in or excluded from reporting. Wavecrest URL categorization
detects and identifies a broad range and a high percentage of total Web activity.
Conclusion
With a variety of audiences or users requiring very specific Web-use data, organizations seek and
require different types of Web-use reporting capabilities that will meet their needs. Operational, Strategic,
and Analytical reporting provide benefits for IT personnel, administrators, managers, HR staff, and
other users, and can be customized to meet the needs of the business. Operational reporting monitors
employee Web activity and network performance in real time. Strategic reporting provides snapshots
of Web activity with drill-down capability, identifying top Internet consumers. Analytical reporting shows
trends and comparisons in Web activity as well as detailed data.
Smart Engine analytics allows you to analyze large volumes of data over extended periods of time,
utilizing algorithms to determine precise data from Web traffic and feeding this data to the reporting
components. With its industry-leading algorithms, the key benefit of Wavecrest’s Smart Engine is
providing the manager-ready, actionable reporting that nontechnical personnel in the company needs.
Backed by its 20-plus years in monitoring and reporting on Web traffic, Wavecrest offers customized
reporting capabilities for all users in the organization to effectively manage and control employee Web use
as well as network performance.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2018 Wavecrest Computing
Incorporated. All rights reserved.
About Wavecrest Computing
Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management
and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT
Specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin
and CyBlock products to manage the human factor in business Internet usage–managing cloud services,
reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest is
trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S.
Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing
list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For
more information on the company, products, and partners, visit https://www.wavecrest.net.

More Related Content

What's hot

Mis assignment 2013
Mis assignment 2013Mis assignment 2013
Mis assignment 2013Rhoda Arthur
 
Pw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 SarboxPw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 Sarboxgreghawes
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...AnalytixDataServices
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data IntegrationAnalytiX DS
 
Operations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk MitigationOperations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk MitigationMatthew Leiv
 
Intelligent process automation
Intelligent process  automationIntelligent process  automation
Intelligent process automationnainabhatt2
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
Anti-Money Laundering Solution
Anti-Money Laundering SolutionAnti-Money Laundering Solution
Anti-Money Laundering SolutionSri Ambati
 

What's hot (8)

Mis assignment 2013
Mis assignment 2013Mis assignment 2013
Mis assignment 2013
 
Pw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 SarboxPw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 Sarbox
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
Operations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk MitigationOperations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk Mitigation
 
Intelligent process automation
Intelligent process  automationIntelligent process  automation
Intelligent process automation
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Anti-Money Laundering Solution
Anti-Money Laundering SolutionAnti-Money Laundering Solution
Anti-Money Laundering Solution
 

Similar to Reporting Types and Smart Engine Analytics

RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDYRESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDYIRJET Journal
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine LearningIRJET Journal
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health CheckerIRJET Journal
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsJane Roberts
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self ServiceMike Streb
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating SystemIRJET Journal
 
IJSRED-V2I5P30
IJSRED-V2I5P30IJSRED-V2I5P30
IJSRED-V2I5P30IJSRED
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfKarishma Chaudhary
 

Similar to Reporting Types and Smart Engine Analytics (20)

RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDYRESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analytics
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self Service
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
Web analytics
Web analyticsWeb analytics
Web analytics
 
Web a
Web aWeb a
Web a
 
IJSRED-V2I5P30
IJSRED-V2I5P30IJSRED-V2I5P30
IJSRED-V2I5P30
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 

More from Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetWavecrest Computing
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityWavecrest Computing
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsWavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefWavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Wavecrest Computing
 

More from Wavecrest Computing (20)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Reporting Types and Smart Engine Analytics

  • 2. Wavecrest Computing Reporting Types and Smart Engine Analytics page 2 Introduction In order to keep enterprise networks secure and operating efficiently, organizations need to have clear visibility into the Internet traffic traversing their networks. IT personnel need access to real-time information related to employee Web use and the health or performance of the network. Managers and HR personnel are more concerned with human behavior in the workplace and want data related to high Internet activity as well as the details of and patterns in employee Web use. They and other users, such as forensic investigators, may need more analytical, precise information related to visited sites, user names, time spent online, and content categories, spanning a long period of time. One issue that organizations face is that the right information is not getting to the right people in the right format. That is to say, managers who may want to address productivity issues with employees, based on their Internet use or abuse, do not have the information in an easy-to-read and actionable format. They may not even have reporting access to their department’s Web activity whether through data visualizations such as charts, e-mailed reports, or a manager portal. Another issue is that if there is reporting on Web traffic in the organization, it may be inadequate in showing relevant human behavior in the workplace. Without knowing the human behavior in the organization, management is unable to define what is normal and flag anomalies that may indicate insider threats, that is, human actions, whether unintentional mistakes or malicious acts, that threaten data security. They are also unable to detect trends in workforce productivity or determine whether an employee is in compliance with corporate policy. Reporting dashboards and reporting engines provide several benefits for IT staff, administrators, managers, HR personnel, and other users. They can provide specific information to a specific audience in the company, increasing efficiency and productivity. These reporting tools can be used for analysis of human behavior and system health which allows companies to manage and control employee Internet use as well as network performance and security. They can be customized to offer different types of analyses for different users and therefore serve different purposes. They comprise different reporting types such as Operational, Strategic, and Analytical reporting. Reporting engines, also called Smart Engines, feed the data to these tools and provide the analytics necessary for accurate, actionable reporting. Reporting types and Smart Engines are discussed below. Reporting Types and Smart Engines Operational reporting shows activity that is happening now and is based on real-time data. With this reporting type, IT can monitor current employee Web activity and system performance, and the data is updated frequently. Operational reporting components are designed to be viewed multiple times during the day. Strategic reporting provides information at set time frames, and its individual visualizations, such as dashboard charts, are updated on a recurring basis at less frequent intervals. In relation to key performance indicators or metrics, Strategic reporting can show a snapshot of top consumer Web activity with interactive visualizations providing the details. Analytical reporting shows patterns of activity over time as well as comparisons of Web traffic occurring in specific time frames. Its data visualizations may consist of trend and comparison charts as well as detailed audit reports, allowing you to analyze large volumes of Web activity data for long-term audits and forensic investigations. Reporting engines provide the analytics for all reporting types, ensuring that companies have adequate information to manage and control employee Web use. Smart Engine analytics affords detailed analysis,
  • 3. Wavecrest Computing Reporting Types and Smart Engine Analytics page 3 permitting the investigation of trends, policy violation, Internet misuse, and ultimately, human behavior. For companies struggling to address the human factor of cybersecurity, the Smart Engine is a necessity to get the best possible insight into the security issues affecting the IT environment and the human behavior occurring in the workplace. To support your Web-use reporting needs, Wavecrest provides customized reporting capabilities to supply different audiences in the company with information specific to their needs. The organization can then observe normal human behavior and detect anomalies with the availability of dashboard charts, metrics, reports, and Smart Engine analytics. The company also saves time and money by serving dashboards, reports, and metrics from an easy-to-use portal. Most importantly, with Smart Engine analytics, the Smart Engine catches what you might miss with large volumes of data and allows you to identify issues faster. Wavecrest’s Reporting Capabilities While one audience may have specific Web-use data needs, there will be overlap in the types of Web- use reporting tools best suited for that audience. The important thing is that that audience’s questions are being answered by the reporting tools to drive decisions and actions, that is, the right information is getting to the right people. Operational Operational reporting covers two areas: real-time employee Web-use metrics and real-time system metrics--pertinent information for IT personnel. With real-time employee Web-use metrics, IT can monitor Web activity in real time by user, URL, and content category. IT personnel can also monitor the employee bandwidth consumption in the enterprise. Based on an established threshold, bandwidth can be throttled using a content category control policy or a group control policy. Alerts are triggered and e-mail notifications are sent when thresholds are reached. Real-time employee Web-use metrics give a real- time running display of the browsing behavior of employees, that is, current user activity, and identifies bandwidth hogs in real time. Real-Time Employee Web-Use Metrics With real-time system metrics, IT personnel can monitor the health status of different aspects of the system. These include the overall status of the application server, system information such as memory, disk utilization, and number of threads, the validity of all log file data, the success of imported log files, jobs queued for processing, and product event errors and messages on various processes such as scheduling reports and importing data.
  • 4. Wavecrest Computing Reporting Types and Smart Engine Analytics page 4 Strategic Strategic reporting summarizes performance over set time frames, for example, last week or last month. This data may be of interest to managers and HR personnel as well as IT staff. Dashboard Top charts depict Web use for the top users, groups, categories, classifications, and sites in the enterprise. With these interactive visualizations, management can quickly discover and track which users, categories, or sites had the most activity, how much time users are spending online, and so on. With drill-down capability, these charts can provide the details of user Web activity for audits and investigations. Top Users Chart Analytical Analytical reporting shows trends in data over time as well as comparisons of Web activity. This data may be of interest to managers and HR personnel. Dashboard Trend charts depict Web activity for a selected user, group, category, or classification, or traffic data in hourly or daily increments for a predefined date range, such as Yesterday, Previous 24 Hours, and Last 7 Days. Data can also be viewed for custom date ranges. Trend charts also allow you to compare the Web traffic for a set date range with that of a previous period to detect any anomalies in Web activity.
  • 5. Wavecrest Computing Reporting Types and Smart Engine Analytics page 5 Top Categories Trend Chart Also included as part of Analytical reporting are categorized audit reports that deliver a comprehensive analysis of user activity including their visits, search terms, and inappropriate sites. These low-level audit reports allow you to get a detailed analysis of a single user’s visits including the site’s category and full URL, view search terms that a user entered on popular search sites such as Google, and see specific URLs to which a user was denied. They can be quickly run as ad hoc reports saving you time in your audit or investigation. Smart Engine Analytics Smart Engine analytics provide the data for Wavecrest reporting. With its precise algorithms, the Smart Engine is used by charts and reports to present accurate and up-to-date Web-use data. The Smart Engine utilizes algorithms that perform functions such as determining visits, user names, and time online from Web traffic, and categorizing URLs into logical groups based on content. Without the Smart Engine and its analytics, the reporting components could not provide the adequate information that your company needs to manage employee Web use. The Smart Engine makes technical data usable and manager- ready. Examples of its algorithms are discussed below. The differentiation between Web traffic hits and visits is of paramount importance for companies that want to manage the human factor. True visits are actual user clicks that do not include multimedia URLs, such as graphics, audio Web pages, advertisements, or Web pages that were requested as part of a visit, that is, unsolicited. By identifying the content of each URL, the Wavecrest Visit algorithm distinguishes between these user clicks and the unsolicited traffic, i.e., hits. The organization can then get a true, meaningful picture of the level and type of Web activity occurring in the network. When Web filtering and reporting products do not include user names in Web traffic records, user Web activity is lost and unaccounted for. The company may not even know that this is occurring. The Wavecrest User Name Caching algorithm uses the cache user name if available, versus the IP address, allowing you to capture all activity of the user and get more detailed data in reporting. When users are online, that is, on the Internet, they could be reading a Web page, performing another task in a different application with the browser open, or possibly away from the computer entirely with
  • 6. Wavecrest Computing Reporting Types and Smart Engine Analytics page 6 the browser open. The Wavecrest Time Online algorithm uses a highly accurate priority method for calculating users’ time online. Managers and IT administrators can quickly see which users, categories, sites, and so on had the most volume of activity and address any potential issues, such as productivity loss, bandwidth slowdowns, and policy noncompliance. The Wavecrest Categorization algorithm is designed to report on all Web activity. With a number of standard and cloud service categories and an unlimited number of custom categories, the Categorization algorithm categorizes the organization’s Web activity so that managers can analyze their employees’ Web usage. Custom categories allow additional monitoring where you can create a white list for more tailored reports so that custom URLs are included in or excluded from reporting. Wavecrest URL categorization detects and identifies a broad range and a high percentage of total Web activity. Conclusion With a variety of audiences or users requiring very specific Web-use data, organizations seek and require different types of Web-use reporting capabilities that will meet their needs. Operational, Strategic, and Analytical reporting provide benefits for IT personnel, administrators, managers, HR staff, and other users, and can be customized to meet the needs of the business. Operational reporting monitors employee Web activity and network performance in real time. Strategic reporting provides snapshots of Web activity with drill-down capability, identifying top Internet consumers. Analytical reporting shows trends and comparisons in Web activity as well as detailed data. Smart Engine analytics allows you to analyze large volumes of data over extended periods of time, utilizing algorithms to determine precise data from Web traffic and feeding this data to the reporting components. With its industry-leading algorithms, the key benefit of Wavecrest’s Smart Engine is providing the manager-ready, actionable reporting that nontechnical personnel in the company needs. Backed by its 20-plus years in monitoring and reporting on Web traffic, Wavecrest offers customized reporting capabilities for all users in the organization to effectively manage and control employee Web use as well as network performance.
  • 7. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2018 Wavecrest Computing Incorporated. All rights reserved. About Wavecrest Computing Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT Specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage–managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest is trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.