SlideShare a Scribd company logo
www.wavecrest.net
WavecrestCyBlock®
Client
Easy Web Access Lockdown
CyBlock Client provides the ability to administratively lock down and control users’ access to the Internet.
CyBlock Client Setup
Administrative Web Access Lockdown
•	 Users cannot remove or change proxy settings in their
browser.
•	 Client monitors all configured proxies for availability.
•	 Ability to set proxy server priority order.
•	 Uninterrupted service; if defined proxies are down, users will
go direct.
Real-Time Status Information
Key Features
•	 Ensures that your Internet users are going through
CyBlock.
•	 No need to configure browser settings on each user’s
computer.
•	 Devices seamlessly transition between on-site and
remote.
•	 Works with CyBlock Appliance, Software, and Cloud.
•	 Uses Thin Client technology.
•	 Easy to set up and manage.
•	 Autodetects network changes.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
sales@wavecrest.net
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2014 Wavecrest Computing
Incorporated. All rights reserved.
Wavecrest Computing has provided
business and government clients
with reliable, accurate Web-use
management products since 1996.
IT specialists, HR professionals,
and business managers trust
Wavecrest’s Cyfin® and CyBlock®
products to manage employee
Internet usage – reducing liability
risks, improving productivity, saving
bandwidth, and controlling costs.
Wavecrest has over 3,000 clients
worldwide, including Edward Jones,
General Electric, IBM, MillerCoors,
New York City Dept. of Transportation,
Rolex, Siemens, and a growing list of
global enterprises and government
agencies. For more information
on our company, products, and
partners, visit www.wavecrest.net.
Technical Advantages
•	 Installation Options. Install from one central location using PsExec or Active
Directory GPO.
•	 Minimal-Effort Administration. Sync configuration of one client with all others.
•	 Quick Deployment. Remotely install on users’ computers.
•	 Browser Lockdown. Users cannot remove or change proxy settings.
•	 Browser Compatibility. Fully tested in the latest version of Internet Explorer.
Also compatible with Internet Explorer Version 8.0 or higher, Firefox, Chrome,
Safari, and Opera.
Thin Client Software
CyBlock Client is thin client software that relies on the proxy server, that is,
CyBlock Appliance, CyBlock Software, or CyBlock Cloud, to perform the
information processing. The benefits are little maintenance and improved security
due to central administration of the software. CyBlock Client supports Windows
XP, Windows 7, and Windows 8 in desktop mode.
Support Services
Support is available via telephone, e-mail, WebEx, and the Wavecrest Knowledge
Base at no extra charge. Our Technical Support representatives will answer
questions about product setup, policy support usage, technical issues, and more
via telephone or e-mail.
WebEx is a customer communications tool that enables our Support staff to more
easily and quickly address any product-related questions, provide assistance with
setup, and/or troubleshoot technical issues. We also use it to demonstrate the
product and provide product evaluators a better understanding of the functionality.
Our knowledge base provides immediate 24/7 support to our global customer
base. Customers will be able to quickly find the answers they are looking for. It
comes with an enhanced search tool that shows relevant results as you type.

More Related Content

What's hot

Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and Us
Lee Saferite
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagram
bcheney76
 
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
John Wallix
 
Shahzaib
ShahzaibShahzaib
Managed Services
Managed ServicesManaged Services
Managed Services
ariazk
 
Hameed Keshavarzi
Hameed KeshavarziHameed Keshavarzi
Hameed Keshavarzi
Hameed Keshavarzi
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
ManageEngine, Zoho Corporation
 
Kaseya monitoring tool
Kaseya monitoring toolKaseya monitoring tool
Kaseya monitoring tool
Antony Georgin G
 
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
Ali Shoaee
 
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
ManageEngine, Zoho Corporation
 
SpotSkimDataSheet
SpotSkimDataSheetSpotSkimDataSheet
SpotSkimDataSheet
Jeff Schorr
 
Why choose-3 cx-phone-system
Why choose-3 cx-phone-systemWhy choose-3 cx-phone-system
Why choose-3 cx-phone-system
Karren Alipis
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PROIDEA
 
Jogobu
JogobuJogobu
Jogobu
roylexi
 
Why QuickBooks Premier Hosting
Why QuickBooks Premier HostingWhy QuickBooks Premier Hosting
Why QuickBooks Premier Hosting
Jhonny Edward
 
3CX hotel module
3CX hotel module3CX hotel module
3CX hotel module
PBX2IP
 
End point control
End point controlEnd point control
End point control
Lan & Wan Solutions
 
Desktop central-it-mgr
Desktop central-it-mgrDesktop central-it-mgr
Desktop central-it-mgr
daneshjou
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
NCS Computech Ltd.
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
Syntax Inc.
 

What's hot (20)

Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and Us
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagram
 
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.For CIOs and CISOs: every user is a privileged user, learn how to deal with.
For CIOs and CISOs: every user is a privileged user, learn how to deal with.
 
Shahzaib
ShahzaibShahzaib
Shahzaib
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
Hameed Keshavarzi
Hameed KeshavarziHameed Keshavarzi
Hameed Keshavarzi
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Kaseya monitoring tool
Kaseya monitoring toolKaseya monitoring tool
Kaseya monitoring tool
 
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...Sundray hospitality wlan solution   wifi - wireless - hotel - Info Tech Middl...
Sundray hospitality wlan solution wifi - wireless - hotel - Info Tech Middl...
 
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
Insurance Company in Michigan replaces Solarwinds Orion with ManageEngine OpM...
 
SpotSkimDataSheet
SpotSkimDataSheetSpotSkimDataSheet
SpotSkimDataSheet
 
Why choose-3 cx-phone-system
Why choose-3 cx-phone-systemWhy choose-3 cx-phone-system
Why choose-3 cx-phone-system
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
 
Jogobu
JogobuJogobu
Jogobu
 
Why QuickBooks Premier Hosting
Why QuickBooks Premier HostingWhy QuickBooks Premier Hosting
Why QuickBooks Premier Hosting
 
3CX hotel module
3CX hotel module3CX hotel module
3CX hotel module
 
End point control
End point controlEnd point control
End point control
 
Desktop central-it-mgr
Desktop central-it-mgrDesktop central-it-mgr
Desktop central-it-mgr
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
 

Similar to Cyblock Client Datasheet

Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
Wavecrest Computing
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
Wavecrest Computing
 
QuickBooks Hosting Services
QuickBooks Hosting ServicesQuickBooks Hosting Services
QuickBooks Hosting Services
Jhonny Edward
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
Wavecrest Computing
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
Saurav Aich
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
Wavecrest Computing
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
Wavecrest Computing
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
Emmerick Gortz
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
AVG Technologies
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
MarketingArrowECS_CZ
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011
Joe Palo Alto
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
Eduardo Patrocinio
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
Amazon Web Services
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
Nicholas Davis
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
NAISales2
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
Pasquale Tursi
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
Teguh Febrianto Setiawan
 

Similar to Cyblock Client Datasheet (20)

Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
QuickBooks Hosting Services
QuickBooks Hosting ServicesQuickBooks Hosting Services
QuickBooks Hosting Services
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
 

More from Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
Wavecrest Computing
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine Analytics
Wavecrest Computing
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
Wavecrest Computing
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
Wavecrest Computing
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
Wavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
Wavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
Wavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
Wavecrest Computing
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
Wavecrest Computing
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
Wavecrest Computing
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
Wavecrest Computing
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
Wavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
Wavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Wavecrest Computing
 

More from Wavecrest Computing (16)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine Analytics
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Cyblock Client Datasheet

  • 1. www.wavecrest.net WavecrestCyBlock® Client Easy Web Access Lockdown CyBlock Client provides the ability to administratively lock down and control users’ access to the Internet. CyBlock Client Setup Administrative Web Access Lockdown • Users cannot remove or change proxy settings in their browser. • Client monitors all configured proxies for availability. • Ability to set proxy server priority order. • Uninterrupted service; if defined proxies are down, users will go direct. Real-Time Status Information Key Features • Ensures that your Internet users are going through CyBlock. • No need to configure browser settings on each user’s computer. • Devices seamlessly transition between on-site and remote. • Works with CyBlock Appliance, Software, and Cloud. • Uses Thin Client technology. • Easy to set up and manage. • Autodetects network changes.
  • 2. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 sales@wavecrest.net www.wavecrest.net All specifications subject to change without notice. © Copyright 2014 Wavecrest Computing Incorporated. All rights reserved. Wavecrest Computing has provided business and government clients with reliable, accurate Web-use management products since 1996. IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage – reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors, New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net. Technical Advantages • Installation Options. Install from one central location using PsExec or Active Directory GPO. • Minimal-Effort Administration. Sync configuration of one client with all others. • Quick Deployment. Remotely install on users’ computers. • Browser Lockdown. Users cannot remove or change proxy settings. • Browser Compatibility. Fully tested in the latest version of Internet Explorer. Also compatible with Internet Explorer Version 8.0 or higher, Firefox, Chrome, Safari, and Opera. Thin Client Software CyBlock Client is thin client software that relies on the proxy server, that is, CyBlock Appliance, CyBlock Software, or CyBlock Cloud, to perform the information processing. The benefits are little maintenance and improved security due to central administration of the software. CyBlock Client supports Windows XP, Windows 7, and Windows 8 in desktop mode. Support Services Support is available via telephone, e-mail, WebEx, and the Wavecrest Knowledge Base at no extra charge. Our Technical Support representatives will answer questions about product setup, policy support usage, technical issues, and more via telephone or e-mail. WebEx is a customer communications tool that enables our Support staff to more easily and quickly address any product-related questions, provide assistance with setup, and/or troubleshoot technical issues. We also use it to demonstrate the product and provide product evaluators a better understanding of the functionality. Our knowledge base provides immediate 24/7 support to our global customer base. Customers will be able to quickly find the answers they are looking for. It comes with an enhanced search tool that shows relevant results as you type.