10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

10 12, 2010

Watch Latest Webinar – Web 2.0 in the Workplace today

By | 2010-12-10T13:08:40+00:00 December 10th, 2010|ClearSwift, How To, Sales and Marketing, Uncategorized, Vantage|0 Comments

In light of Clearswift’s (network security vendor and WebSpy technology partner) latest research report, Web 2.0 in the Workplace Today, WebSpy and Clearswift will host a series of webinars aimed at the channel. Even though the webinars are channel focused I thought I’d share the most recent one with all of you. It includes very [...]

10 12, 2010

Latest Research and 5 Tips for Managing Web 2.0 in the Workplace

By | 2010-12-10T12:26:46+00:00 December 10th, 2010|ClearSwift, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy News Update|0 Comments

Clearswift (network security vendor and WebSpy technology partner) recently released their first report, in a series of three, on the use of social media and web 2.0 in the workplace. From not wanting to touch social media with a ten foot pole, employers are these days increasingly aware of the benefits of social media and [...]

7 12, 2010

Who should take the responsibility for Adolescent Cyber Bullying?

By | 2010-12-07T12:34:52+00:00 December 7th, 2010|How To, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

I just read a long, but rather interesting, article on adolescent cyber bullying. Cyber bullying is legally defined as repeated harassment online, although in popular use, it can describe even a sharp-elbowed, unwarranted swipe online. We all know kids can be cruel because they often lack the maturity and empathy to understand the emotional ramifications [...]

12 11, 2010

How much do IronPort WSA Appliances eat?

By | 2010-11-12T05:32:47+00:00 November 12th, 2010|cisco, IronPort, Log File Analysis, storages, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

If you are thinking about deploying IronPort Web Security Appliances you probably want to plan how much disk space to budget for with regards to logging and reporting. Every organization is different with regards to the volume of logs it creates, but I’ve averaged three data sets submitted to us by customers to produce the [...]

27 10, 2010

Watch your TMG's waist line. Switch log format and reduce fat now!

By | 2010-10-27T04:57:46+00:00 October 27th, 2010|Firewall Analysis, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, storages, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

We often recommend customers using Microsoft ISA or TMG switch their logging to W3C text file, in order to get the best possible import speed, and also because the text logs are much easier to access from a remote machine (see my previous article on accessing TMG’s SQL Express Log database). Logging to the default [...]

27 10, 2010

Google Claim 6.4% of Internet traffic. Help us put this to the test

By | 2010-10-27T02:54:13+00:00 October 27th, 2010|How To, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

According to recent report, Google has a record slice, 6.4%, of the world’s Internet traffic. An accurate figure? Well, we wanted to put this claim to the test and therefore started off by investigating the share of WebSpy’s traffic to Google sites. We also encourage our Vantage and Analyzer users to do the same thing [...]

21 10, 2010

Twitter Evolution Infographic and Amazing Usage Statistics

By | 2010-10-21T06:05:33+00:00 October 21st, 2010|Uncategorized, WebSpy, WebSpy News Update|0 Comments

As it’s always been pretty difficult getting accurate figures on Twitter demographics and usage I was pretty chuffed to come across below statistics and facts. If you are, or considering, blocking Twitter at your workplace please have a look through these amazing numbers and think again. Seems like Twitter is here to stay doesn’t it? [...]

20 10, 2010

Make Internet Access at Aged Care Facilities Mandatory

By | 2010-10-20T03:56:14+00:00 October 20th, 2010|Uncategorized, WebSpy, WebSpy News Update|0 Comments

I came across this great article about elderly people at aged care facilities and their use of the Internet and social media. After reading the article I continued with some quick and dirty research. It is pretty clear, and not very surprising, that only a minority of aged care facilities around the world offer Internet [...]