SlideShare a Scribd company logo
www.wavecrest.net
Wavecrest®
TechBrief
Reporting Types and Smart Engine
Analytics
Wavecrest Computing Reporting Types and Smart Engine Analytics page 2
Introduction
In order to keep enterprise networks secure and operating efficiently, organizations need to have
clear visibility into the Internet traffic traversing their networks. IT personnel need access to real-time
information related to employee Web use and the health or performance of the network. Managers and
HR personnel are more concerned with human behavior in the workplace and want data related to high
Internet activity as well as the details of and patterns in employee Web use. They and other users, such
as forensic investigators, may need more analytical, precise information related to visited sites, user
names, time spent online, and content categories, spanning a long period of time.
One issue that organizations face is that the right information is not getting to the right people in the
right format. That is to say, managers who may want to address productivity issues with employees,
based on their Internet use or abuse, do not have the information in an easy-to-read and actionable
format. They may not even have reporting access to their department’s Web activity whether through
data visualizations such as charts, e-mailed reports, or a manager portal. Another issue is that if there is
reporting on Web traffic in the organization, it may be inadequate in showing relevant human behavior in
the workplace. Without knowing the human behavior in the organization, management is unable to define
what is normal and flag anomalies that may indicate insider threats, that is, human actions, whether
unintentional mistakes or malicious acts, that threaten data security. They are also unable to detect trends
in workforce productivity or determine whether an employee is in compliance with corporate policy.
Reporting dashboards and reporting engines provide several benefits for IT staff, administrators,
managers, HR personnel, and other users. They can provide specific information to a specific audience
in the company, increasing efficiency and productivity. These reporting tools can be used for analysis of
human behavior and system health which allows companies to manage and control employee Internet
use as well as network performance and security. They can be customized to offer different types of
analyses for different users and therefore serve different purposes. They comprise different reporting
types such as Operational, Strategic, and Analytical reporting. Reporting engines, also called Smart
Engines, feed the data to these tools and provide the analytics necessary for accurate, actionable
reporting. Reporting types and Smart Engines are discussed below.
Reporting Types and Smart Engines
Operational reporting shows activity that is happening now and is based on real-time data. With this
reporting type, IT can monitor current employee Web activity and system performance, and the data is
updated frequently. Operational reporting components are designed to be viewed multiple times during
the day.
Strategic reporting provides information at set time frames, and its individual visualizations, such
as dashboard charts, are updated on a recurring basis at less frequent intervals. In relation to key
performance indicators or metrics, Strategic reporting can show a snapshot of top consumer Web activity
with interactive visualizations providing the details.
Analytical reporting shows patterns of activity over time as well as comparisons of Web traffic occurring
in specific time frames. Its data visualizations may consist of trend and comparison charts as well as
detailed audit reports, allowing you to analyze large volumes of Web activity data for long-term audits and
forensic investigations.
Reporting engines provide the analytics for all reporting types, ensuring that companies have adequate
information to manage and control employee Web use. Smart Engine analytics affords detailed analysis,
Wavecrest Computing Reporting Types and Smart Engine Analytics page 3
permitting the investigation of trends, policy violation, Internet misuse, and ultimately, human behavior.
For companies struggling to address the human factor of cybersecurity, the Smart Engine is a necessity to
get the best possible insight into the security issues affecting the IT environment and the human behavior
occurring in the workplace.
To support your Web-use reporting needs, Wavecrest provides customized reporting capabilities to
supply different audiences in the company with information specific to their needs. The organization can
then observe normal human behavior and detect anomalies with the availability of dashboard charts,
metrics, reports, and Smart Engine analytics. The company also saves time and money by serving
dashboards, reports, and metrics from an easy-to-use portal. Most importantly, with Smart Engine
analytics, the Smart Engine catches what you might miss with large volumes of data and allows you to
identify issues faster.
Wavecrest’s Reporting Capabilities
While one audience may have specific Web-use data needs, there will be overlap in the types of Web-
use reporting tools best suited for that audience. The important thing is that that audience’s questions are
being answered by the reporting tools to drive decisions and actions, that is, the right information is getting
to the right people.
Operational
Operational reporting covers two areas: real-time employee Web-use metrics and real-time system
metrics--pertinent information for IT personnel. With real-time employee Web-use metrics, IT can monitor
Web activity in real time by user, URL, and content category. IT personnel can also monitor the employee
bandwidth consumption in the enterprise. Based on an established threshold, bandwidth can be
throttled using a content category control policy or a group control policy. Alerts are triggered and e-mail
notifications are sent when thresholds are reached. Real-time employee Web-use metrics give a real-
time running display of the browsing behavior of employees, that is, current user activity, and identifies
bandwidth hogs in real time.
Real-Time Employee Web-Use Metrics
With real-time system metrics, IT personnel can monitor the health status of different aspects of the
system. These include the overall status of the application server, system information such as memory,
disk utilization, and number of threads, the validity of all log file data, the success of imported log files, jobs
queued for processing, and product event errors and messages on various processes such as scheduling
reports and importing data.
Wavecrest Computing Reporting Types and Smart Engine Analytics page 4
Strategic
Strategic reporting summarizes performance over set time frames, for example, last week or last month.
This data may be of interest to managers and HR personnel as well as IT staff. Dashboard Top charts
depict Web use for the top users, groups, categories, classifications, and sites in the enterprise. With
these interactive visualizations, management can quickly discover and track which users, categories,
or sites had the most activity, how much time users are spending online, and so on. With drill-down
capability, these charts can provide the details of user Web activity for audits and investigations.
Top Users Chart
Analytical
Analytical reporting shows trends in data over time as well as comparisons of Web activity. This data may
be of interest to managers and HR personnel. Dashboard Trend charts depict Web activity for a selected
user, group, category, or classification, or traffic data in hourly or daily increments for a predefined date
range, such as Yesterday, Previous 24 Hours, and Last 7 Days. Data can also be viewed for custom date
ranges. Trend charts also allow you to compare the Web traffic for a set date range with that of a previous
period to detect any anomalies in Web activity.
Wavecrest Computing Reporting Types and Smart Engine Analytics page 5
Top Categories Trend Chart
Also included as part of Analytical reporting are categorized audit reports that deliver a comprehensive
analysis of user activity including their visits, search terms, and inappropriate sites. These low-level audit
reports allow you to get a detailed analysis of a single user’s visits including the site’s category and full
URL, view search terms that a user entered on popular search sites such as Google, and see specific
URLs to which a user was denied. They can be quickly run as ad hoc reports saving you time in your audit
or investigation.
Smart Engine Analytics
Smart Engine analytics provide the data for Wavecrest reporting. With its precise algorithms, the Smart
Engine is used by charts and reports to present accurate and up-to-date Web-use data. The Smart
Engine utilizes algorithms that perform functions such as determining visits, user names, and time online
from Web traffic, and categorizing URLs into logical groups based on content. Without the Smart Engine
and its analytics, the reporting components could not provide the adequate information that your company
needs to manage employee Web use. The Smart Engine makes technical data usable and manager-
ready. Examples of its algorithms are discussed below.
The differentiation between Web traffic hits and visits is of paramount importance for companies that
want to manage the human factor. True visits are actual user clicks that do not include multimedia URLs,
such as graphics, audio Web pages, advertisements, or Web pages that were requested as part of a visit,
that is, unsolicited. By identifying the content of each URL, the Wavecrest Visit algorithm distinguishes
between these user clicks and the unsolicited traffic, i.e., hits. The organization can then get a true,
meaningful picture of the level and type of Web activity occurring in the network.
When Web filtering and reporting products do not include user names in Web traffic records, user
Web activity is lost and unaccounted for. The company may not even know that this is occurring. The
Wavecrest User Name Caching algorithm uses the cache user name if available, versus the IP address,
allowing you to capture all activity of the user and get more detailed data in reporting.
When users are online, that is, on the Internet, they could be reading a Web page, performing another
task in a different application with the browser open, or possibly away from the computer entirely with
Wavecrest Computing Reporting Types and Smart Engine Analytics page 6
the browser open. The Wavecrest Time Online algorithm uses a highly accurate priority method for
calculating users’ time online. Managers and IT administrators can quickly see which users, categories,
sites, and so on had the most volume of activity and address any potential issues, such as productivity
loss, bandwidth slowdowns, and policy noncompliance.
The Wavecrest Categorization algorithm is designed to report on all Web activity. With a number of
standard and cloud service categories and an unlimited number of custom categories, the Categorization
algorithm categorizes the organization’s Web activity so that managers can analyze their employees’ Web
usage. Custom categories allow additional monitoring where you can create a white list for more tailored
reports so that custom URLs are included in or excluded from reporting. Wavecrest URL categorization
detects and identifies a broad range and a high percentage of total Web activity.
Conclusion
With a variety of audiences or users requiring very specific Web-use data, organizations seek and
require different types of Web-use reporting capabilities that will meet their needs. Operational, Strategic,
and Analytical reporting provide benefits for IT personnel, administrators, managers, HR staff, and
other users, and can be customized to meet the needs of the business. Operational reporting monitors
employee Web activity and network performance in real time. Strategic reporting provides snapshots
of Web activity with drill-down capability, identifying top Internet consumers. Analytical reporting shows
trends and comparisons in Web activity as well as detailed data.
Smart Engine analytics allows you to analyze large volumes of data over extended periods of time,
utilizing algorithms to determine precise data from Web traffic and feeding this data to the reporting
components. With its industry-leading algorithms, the key benefit of Wavecrest’s Smart Engine is
providing the manager-ready, actionable reporting that nontechnical personnel in the company needs.
Backed by its 20-plus years in monitoring and reporting on Web traffic, Wavecrest offers customized
reporting capabilities for all users in the organization to effectively manage and control employee Web use
as well as network performance.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2018 Wavecrest Computing
Incorporated. All rights reserved.
About Wavecrest Computing
Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management
and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT
Specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin
and CyBlock products to manage the human factor in business Internet usage–managing cloud services,
reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest is
trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S.
Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing
list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For
more information on the company, products, and partners, visit https://www.wavecrest.net.

More Related Content

What's hot

Mis assignment 2013
Mis assignment 2013Mis assignment 2013
Mis assignment 2013
Rhoda Arthur
 
Pw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 SarboxPw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 Sarbox
greghawes
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
AnalytixDataServices
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
AnalytiX DS
 
Operations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk MitigationOperations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk Mitigation
Matthew Leiv
 
Intelligent process automation
Intelligent process  automationIntelligent process  automation
Intelligent process automation
nainabhatt2
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
Anti-Money Laundering Solution
Anti-Money Laundering SolutionAnti-Money Laundering Solution
Anti-Money Laundering Solution
Sri Ambati
 

What's hot (8)

Mis assignment 2013
Mis assignment 2013Mis assignment 2013
Mis assignment 2013
 
Pw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 SarboxPw Cwp Spreadsheet404 Sarbox
Pw Cwp Spreadsheet404 Sarbox
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
Operations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk MitigationOperations and Supply Chain Management Risk Mitigation
Operations and Supply Chain Management Risk Mitigation
 
Intelligent process automation
Intelligent process  automationIntelligent process  automation
Intelligent process automation
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Anti-Money Laundering Solution
Anti-Money Laundering SolutionAnti-Money Laundering Solution
Anti-Money Laundering Solution
 

Similar to Reporting Types and Smart Engine Analytics

RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDYRESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
IRJET Journal
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
IRJET Journal
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
IRJET Journal
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analytics
Jane Roberts
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self Service
Mike Streb
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
Wavecrest Computing
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
IRJET Journal
 
Web a
Web aWeb a
Web analytics
Web analyticsWeb analytics
Web analytics
santiagojimenez89
 
IJSRED-V2I5P30
IJSRED-V2I5P30IJSRED-V2I5P30
IJSRED-V2I5P30
IJSRED
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
Karishma Chaudhary
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
Soundar Msr
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 
Mca titles
Mca titlesMca titles
Mca titles
tema_solution
 

Similar to Reporting Types and Smart Engine Analytics (20)

RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDYRESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
RESEARCH CHALLENGES IN WEB ANALYTICS – A STUDY
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
driving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analyticsdriving_business_value_from_real_time_streaming_analytics
driving_business_value_from_real_time_streaming_analytics
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self Service
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
Web a
Web aWeb a
Web a
 
Web analytics
Web analyticsWeb analytics
Web analytics
 
IJSRED-V2I5P30
IJSRED-V2I5P30IJSRED-V2I5P30
IJSRED-V2I5P30
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca titles
Mca titlesMca titles
Mca titles
 

More from Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
Wavecrest Computing
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
Wavecrest Computing
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
Wavecrest Computing
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
Wavecrest Computing
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
Wavecrest Computing
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
Wavecrest Computing
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
Wavecrest Computing
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
Wavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
Wavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
Wavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
Wavecrest Computing
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
Wavecrest Computing
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
Wavecrest Computing
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
Wavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
Wavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Wavecrest Computing
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
Wavecrest Computing
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
Wavecrest Computing
 

More from Wavecrest Computing (20)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Recently uploaded

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Reporting Types and Smart Engine Analytics

  • 2. Wavecrest Computing Reporting Types and Smart Engine Analytics page 2 Introduction In order to keep enterprise networks secure and operating efficiently, organizations need to have clear visibility into the Internet traffic traversing their networks. IT personnel need access to real-time information related to employee Web use and the health or performance of the network. Managers and HR personnel are more concerned with human behavior in the workplace and want data related to high Internet activity as well as the details of and patterns in employee Web use. They and other users, such as forensic investigators, may need more analytical, precise information related to visited sites, user names, time spent online, and content categories, spanning a long period of time. One issue that organizations face is that the right information is not getting to the right people in the right format. That is to say, managers who may want to address productivity issues with employees, based on their Internet use or abuse, do not have the information in an easy-to-read and actionable format. They may not even have reporting access to their department’s Web activity whether through data visualizations such as charts, e-mailed reports, or a manager portal. Another issue is that if there is reporting on Web traffic in the organization, it may be inadequate in showing relevant human behavior in the workplace. Without knowing the human behavior in the organization, management is unable to define what is normal and flag anomalies that may indicate insider threats, that is, human actions, whether unintentional mistakes or malicious acts, that threaten data security. They are also unable to detect trends in workforce productivity or determine whether an employee is in compliance with corporate policy. Reporting dashboards and reporting engines provide several benefits for IT staff, administrators, managers, HR personnel, and other users. They can provide specific information to a specific audience in the company, increasing efficiency and productivity. These reporting tools can be used for analysis of human behavior and system health which allows companies to manage and control employee Internet use as well as network performance and security. They can be customized to offer different types of analyses for different users and therefore serve different purposes. They comprise different reporting types such as Operational, Strategic, and Analytical reporting. Reporting engines, also called Smart Engines, feed the data to these tools and provide the analytics necessary for accurate, actionable reporting. Reporting types and Smart Engines are discussed below. Reporting Types and Smart Engines Operational reporting shows activity that is happening now and is based on real-time data. With this reporting type, IT can monitor current employee Web activity and system performance, and the data is updated frequently. Operational reporting components are designed to be viewed multiple times during the day. Strategic reporting provides information at set time frames, and its individual visualizations, such as dashboard charts, are updated on a recurring basis at less frequent intervals. In relation to key performance indicators or metrics, Strategic reporting can show a snapshot of top consumer Web activity with interactive visualizations providing the details. Analytical reporting shows patterns of activity over time as well as comparisons of Web traffic occurring in specific time frames. Its data visualizations may consist of trend and comparison charts as well as detailed audit reports, allowing you to analyze large volumes of Web activity data for long-term audits and forensic investigations. Reporting engines provide the analytics for all reporting types, ensuring that companies have adequate information to manage and control employee Web use. Smart Engine analytics affords detailed analysis,
  • 3. Wavecrest Computing Reporting Types and Smart Engine Analytics page 3 permitting the investigation of trends, policy violation, Internet misuse, and ultimately, human behavior. For companies struggling to address the human factor of cybersecurity, the Smart Engine is a necessity to get the best possible insight into the security issues affecting the IT environment and the human behavior occurring in the workplace. To support your Web-use reporting needs, Wavecrest provides customized reporting capabilities to supply different audiences in the company with information specific to their needs. The organization can then observe normal human behavior and detect anomalies with the availability of dashboard charts, metrics, reports, and Smart Engine analytics. The company also saves time and money by serving dashboards, reports, and metrics from an easy-to-use portal. Most importantly, with Smart Engine analytics, the Smart Engine catches what you might miss with large volumes of data and allows you to identify issues faster. Wavecrest’s Reporting Capabilities While one audience may have specific Web-use data needs, there will be overlap in the types of Web- use reporting tools best suited for that audience. The important thing is that that audience’s questions are being answered by the reporting tools to drive decisions and actions, that is, the right information is getting to the right people. Operational Operational reporting covers two areas: real-time employee Web-use metrics and real-time system metrics--pertinent information for IT personnel. With real-time employee Web-use metrics, IT can monitor Web activity in real time by user, URL, and content category. IT personnel can also monitor the employee bandwidth consumption in the enterprise. Based on an established threshold, bandwidth can be throttled using a content category control policy or a group control policy. Alerts are triggered and e-mail notifications are sent when thresholds are reached. Real-time employee Web-use metrics give a real- time running display of the browsing behavior of employees, that is, current user activity, and identifies bandwidth hogs in real time. Real-Time Employee Web-Use Metrics With real-time system metrics, IT personnel can monitor the health status of different aspects of the system. These include the overall status of the application server, system information such as memory, disk utilization, and number of threads, the validity of all log file data, the success of imported log files, jobs queued for processing, and product event errors and messages on various processes such as scheduling reports and importing data.
  • 4. Wavecrest Computing Reporting Types and Smart Engine Analytics page 4 Strategic Strategic reporting summarizes performance over set time frames, for example, last week or last month. This data may be of interest to managers and HR personnel as well as IT staff. Dashboard Top charts depict Web use for the top users, groups, categories, classifications, and sites in the enterprise. With these interactive visualizations, management can quickly discover and track which users, categories, or sites had the most activity, how much time users are spending online, and so on. With drill-down capability, these charts can provide the details of user Web activity for audits and investigations. Top Users Chart Analytical Analytical reporting shows trends in data over time as well as comparisons of Web activity. This data may be of interest to managers and HR personnel. Dashboard Trend charts depict Web activity for a selected user, group, category, or classification, or traffic data in hourly or daily increments for a predefined date range, such as Yesterday, Previous 24 Hours, and Last 7 Days. Data can also be viewed for custom date ranges. Trend charts also allow you to compare the Web traffic for a set date range with that of a previous period to detect any anomalies in Web activity.
  • 5. Wavecrest Computing Reporting Types and Smart Engine Analytics page 5 Top Categories Trend Chart Also included as part of Analytical reporting are categorized audit reports that deliver a comprehensive analysis of user activity including their visits, search terms, and inappropriate sites. These low-level audit reports allow you to get a detailed analysis of a single user’s visits including the site’s category and full URL, view search terms that a user entered on popular search sites such as Google, and see specific URLs to which a user was denied. They can be quickly run as ad hoc reports saving you time in your audit or investigation. Smart Engine Analytics Smart Engine analytics provide the data for Wavecrest reporting. With its precise algorithms, the Smart Engine is used by charts and reports to present accurate and up-to-date Web-use data. The Smart Engine utilizes algorithms that perform functions such as determining visits, user names, and time online from Web traffic, and categorizing URLs into logical groups based on content. Without the Smart Engine and its analytics, the reporting components could not provide the adequate information that your company needs to manage employee Web use. The Smart Engine makes technical data usable and manager- ready. Examples of its algorithms are discussed below. The differentiation between Web traffic hits and visits is of paramount importance for companies that want to manage the human factor. True visits are actual user clicks that do not include multimedia URLs, such as graphics, audio Web pages, advertisements, or Web pages that were requested as part of a visit, that is, unsolicited. By identifying the content of each URL, the Wavecrest Visit algorithm distinguishes between these user clicks and the unsolicited traffic, i.e., hits. The organization can then get a true, meaningful picture of the level and type of Web activity occurring in the network. When Web filtering and reporting products do not include user names in Web traffic records, user Web activity is lost and unaccounted for. The company may not even know that this is occurring. The Wavecrest User Name Caching algorithm uses the cache user name if available, versus the IP address, allowing you to capture all activity of the user and get more detailed data in reporting. When users are online, that is, on the Internet, they could be reading a Web page, performing another task in a different application with the browser open, or possibly away from the computer entirely with
  • 6. Wavecrest Computing Reporting Types and Smart Engine Analytics page 6 the browser open. The Wavecrest Time Online algorithm uses a highly accurate priority method for calculating users’ time online. Managers and IT administrators can quickly see which users, categories, sites, and so on had the most volume of activity and address any potential issues, such as productivity loss, bandwidth slowdowns, and policy noncompliance. The Wavecrest Categorization algorithm is designed to report on all Web activity. With a number of standard and cloud service categories and an unlimited number of custom categories, the Categorization algorithm categorizes the organization’s Web activity so that managers can analyze their employees’ Web usage. Custom categories allow additional monitoring where you can create a white list for more tailored reports so that custom URLs are included in or excluded from reporting. Wavecrest URL categorization detects and identifies a broad range and a high percentage of total Web activity. Conclusion With a variety of audiences or users requiring very specific Web-use data, organizations seek and require different types of Web-use reporting capabilities that will meet their needs. Operational, Strategic, and Analytical reporting provide benefits for IT personnel, administrators, managers, HR staff, and other users, and can be customized to meet the needs of the business. Operational reporting monitors employee Web activity and network performance in real time. Strategic reporting provides snapshots of Web activity with drill-down capability, identifying top Internet consumers. Analytical reporting shows trends and comparisons in Web activity as well as detailed data. Smart Engine analytics allows you to analyze large volumes of data over extended periods of time, utilizing algorithms to determine precise data from Web traffic and feeding this data to the reporting components. With its industry-leading algorithms, the key benefit of Wavecrest’s Smart Engine is providing the manager-ready, actionable reporting that nontechnical personnel in the company needs. Backed by its 20-plus years in monitoring and reporting on Web traffic, Wavecrest offers customized reporting capabilities for all users in the organization to effectively manage and control employee Web use as well as network performance.
  • 7. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2018 Wavecrest Computing Incorporated. All rights reserved. About Wavecrest Computing Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT Specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage–managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest is trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.