SlideShare a Scribd company logo
1 of 7
Wavecrest Computing
Web Security, Visibility and Compliance Solutions
About Wavecrest Computing
• Celebrating 20 years in business
• Global partner and customer base
• GSA Schedule holder since 2000
• US based development and support teams
• Wavecrest clients including General Electric, Lockheed Martin, Florida
Department of Health, Siemens, Department of Homeland Security, and a
growing list of global enterprises and government agencies.
Employee Web-use Security & Management Solutions:
• Advanced Web Filtering
• Monitoring & Reporting Web-use Analytics
• Identify and Detect Cloud Services
• Bandwidth Monitoring & Throttling
• Forensic (detailed) audits
• BYOD (Guest Wifi Security)
Product Families
Web-Access Security Gateway
Flexible Deployment Options:
● Software
● Appliance
● Hybrid
● Cloud
Web-use Monitoring & Analytics
Supports over 100+ Log
Formats:
● Palo Alto Networks
● SonicWALL
● WatchGuard
● IronPort
Web-Access Security Gateway
• Meets Today’s Challenges - Manage cloud services, discover Shadow IT.
• Advanced Web Filtering - Configure policy exceptions by user or group.
• Threat Protection - Keep out malware, spyware, phishing, and more.
• Bandwidth Control - Configure thresholds to dynamically trigger caps.
• Regulatory Compliance - HIPAA, CIPA, and more.
• Comprehensive Reports - Accurate, interactive, and manager-ready.
• Distributed Workforce - Easily manage guest networks and BYOD.
Web-use Monitoring & Analytics
• Reporting Add-on - Generates actionable employee Web-use reports
• Analytics - Comprehensive detail in easy-to-understand charts.
• Drilldown - Detailed forensic-level reporting.
• Compatible - Supports all major firewall and gateway devices.
• Built-in Syslog Server - Directly connect Syslog-enabled devices.
• Cloud Visibility - Identify and Detect Cloud Services.
• Scalable - Most scalable log analysis product on the market.
Contact Information:
• Email: sales@wavecrest.net
• Phone: 877-442-9346 or 321-953-5351
• Website: https://www.wavecrest.net

More Related Content

What's hot

Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 SecurityBitglass
 
1 final secnet_pci
1 final secnet_pci1 final secnet_pci
1 final secnet_pcimosyas
 
Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming UnphishableFIDO Alliance
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesLalit Singh
 
eduTEAMS
eduTEAMSeduTEAMS
eduTEAMSJisc
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionControlCase
 
GWAVACon 2013: Licensing session
GWAVACon 2013: Licensing session GWAVACon 2013: Licensing session
GWAVACon 2013: Licensing session GWAVA
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE - ATT&CKcon
 
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowForgeRock
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskSkybox Security
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0ControlCase
 
TagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBTagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBMarco Frassinetti
 

What's hot (19)

Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
1 final secnet_pci
1 final secnet_pci1 final secnet_pci
1 final secnet_pci
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming Unphishable
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
eduTEAMS
eduTEAMSeduTEAMS
eduTEAMS
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
GWAVACon 2013: Licensing session
GWAVACon 2013: Licensing session GWAVACon 2013: Licensing session
GWAVACon 2013: Licensing session
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
 
PA-DSS
PA-DSSPA-DSS
PA-DSS
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 
TagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBTagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEB
 

Viewers also liked

La Gallinita Roja
La Gallinita RojaLa Gallinita Roja
La Gallinita Rojagueste2d3e2
 
La gallina y sus pollitos
La gallina y sus pollitosLa gallina y sus pollitos
La gallina y sus pollitosSanta Catalina
 
Widest Choice of Airfares Airfare Guide
Widest Choice of Airfares Airfare GuideWidest Choice of Airfares Airfare Guide
Widest Choice of Airfares Airfare GuideJason Nooning
 
νέο παρουσίαση του Microsoft office power point
νέο παρουσίαση του Microsoft office power pointνέο παρουσίαση του Microsoft office power point
νέο παρουσίαση του Microsoft office power pointAnna Dolk
 
Kane County CHIP 2011-2016
Kane County CHIP 2011-2016Kane County CHIP 2011-2016
Kane County CHIP 2011-2016Kevin McKenzie
 
PresentAid-ChristmasCampaign2015-External
PresentAid-ChristmasCampaign2015-ExternalPresentAid-ChristmasCampaign2015-External
PresentAid-ChristmasCampaign2015-ExternalMontserrat Cano
 
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...Sustainable Brands
 

Viewers also liked (16)

La Gallinita Roja
La Gallinita RojaLa Gallinita Roja
La Gallinita Roja
 
Boobalan-NMCS-2014
Boobalan-NMCS-2014Boobalan-NMCS-2014
Boobalan-NMCS-2014
 
Nixonnnnn
NixonnnnnNixonnnnn
Nixonnnnn
 
La gallina y sus pollitos
La gallina y sus pollitosLa gallina y sus pollitos
La gallina y sus pollitos
 
Chanticleer Holdings
Chanticleer HoldingsChanticleer Holdings
Chanticleer Holdings
 
CV
CVCV
CV
 
Widest Choice of Airfares Airfare Guide
Widest Choice of Airfares Airfare GuideWidest Choice of Airfares Airfare Guide
Widest Choice of Airfares Airfare Guide
 
νέο παρουσίαση του Microsoft office power point
νέο παρουσίαση του Microsoft office power pointνέο παρουσίαση του Microsoft office power point
νέο παρουσίαση του Microsoft office power point
 
22.02.2016 buidling resilience in mongolia march 2016
22.02.2016 buidling resilience in mongolia march 201622.02.2016 buidling resilience in mongolia march 2016
22.02.2016 buidling resilience in mongolia march 2016
 
Kane County CHIP 2011-2016
Kane County CHIP 2011-2016Kane County CHIP 2011-2016
Kane County CHIP 2011-2016
 
PresentAid-ChristmasCampaign2015-External
PresentAid-ChristmasCampaign2015-ExternalPresentAid-ChristmasCampaign2015-External
PresentAid-ChristmasCampaign2015-External
 
EVIDENCIA 1 CALENTADOR SOLAR
EVIDENCIA  1 CALENTADOR SOLAREVIDENCIA  1 CALENTADOR SOLAR
EVIDENCIA 1 CALENTADOR SOLAR
 
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
 
22.02.2016 financial market developments of mongolia
22.02.2016 financial market developments of mongolia22.02.2016 financial market developments of mongolia
22.02.2016 financial market developments of mongolia
 
Questões inss
Questões inssQuestões inss
Questões inss
 
Resumão ibge
Resumão ibgeResumão ibge
Resumão ibge
 

Similar to About wavecrest Computing

5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds
 
Web filterdatasheet us
Web filterdatasheet usWeb filterdatasheet us
Web filterdatasheet uskizado
 
Chris Folkerd - UK Fast - eCommerce in the Cloud ERA
Chris Folkerd - UK Fast - eCommerce in the Cloud ERAChris Folkerd - UK Fast - eCommerce in the Cloud ERA
Chris Folkerd - UK Fast - eCommerce in the Cloud ERAEmma Roberts
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmySolarWinds
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...Priyanka Aash
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Microsoft Technet France
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentationNAISales2
 
Government and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceGovernment and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceSolarWinds
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 

Similar to About wavecrest Computing (20)

5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
WiFiLAN
WiFiLANWiFiLAN
WiFiLAN
 
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CASolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Web filterdatasheet us
Web filterdatasheet usWeb filterdatasheet us
Web filterdatasheet us
 
Chris Folkerd - UK Fast - eCommerce in the Cloud ERA
Chris Folkerd - UK Fast - eCommerce in the Cloud ERAChris Folkerd - UK Fast - eCommerce in the Cloud ERA
Chris Folkerd - UK Fast - eCommerce in the Cloud ERA
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Government and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceGovernment and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database Performance
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 

More from Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetWavecrest Computing
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsWavecrest Computing
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityWavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsWavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefWavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Wavecrest Computing
 

More from Wavecrest Computing (18)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine Analytics
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

About wavecrest Computing

  • 1. Wavecrest Computing Web Security, Visibility and Compliance Solutions
  • 2. About Wavecrest Computing • Celebrating 20 years in business • Global partner and customer base • GSA Schedule holder since 2000 • US based development and support teams • Wavecrest clients including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies.
  • 3. Employee Web-use Security & Management Solutions: • Advanced Web Filtering • Monitoring & Reporting Web-use Analytics • Identify and Detect Cloud Services • Bandwidth Monitoring & Throttling • Forensic (detailed) audits • BYOD (Guest Wifi Security)
  • 4. Product Families Web-Access Security Gateway Flexible Deployment Options: ● Software ● Appliance ● Hybrid ● Cloud Web-use Monitoring & Analytics Supports over 100+ Log Formats: ● Palo Alto Networks ● SonicWALL ● WatchGuard ● IronPort
  • 5. Web-Access Security Gateway • Meets Today’s Challenges - Manage cloud services, discover Shadow IT. • Advanced Web Filtering - Configure policy exceptions by user or group. • Threat Protection - Keep out malware, spyware, phishing, and more. • Bandwidth Control - Configure thresholds to dynamically trigger caps. • Regulatory Compliance - HIPAA, CIPA, and more. • Comprehensive Reports - Accurate, interactive, and manager-ready. • Distributed Workforce - Easily manage guest networks and BYOD.
  • 6. Web-use Monitoring & Analytics • Reporting Add-on - Generates actionable employee Web-use reports • Analytics - Comprehensive detail in easy-to-understand charts. • Drilldown - Detailed forensic-level reporting. • Compatible - Supports all major firewall and gateway devices. • Built-in Syslog Server - Directly connect Syslog-enabled devices. • Cloud Visibility - Identify and Detect Cloud Services. • Scalable - Most scalable log analysis product on the market.
  • 7. Contact Information: • Email: sales@wavecrest.net • Phone: 877-442-9346 or 321-953-5351 • Website: https://www.wavecrest.net