25 01, 2011

Running Multiple Instances of Vantage

By | 2011-01-25T10:20:43+00:00 January 25th, 2011|How To, Reports, storages, Uncategorized, Vantage, WebSpy|0 Comments

In the latest Vantage auto-update (2.2.0.68), we’ve included an experimental feature to allow multiple instances of WebSpy Vantage to run on the same operating system. The goal here is to run reports at the same time using multiple instances of the application. To do this, we have also include a second experimental feature to disable [...]

25 01, 2011

Vantage Update 2.2.0.68 (Exchange 2010, Juniper and IronPort Traffic Logs, and more)

By | 2011-01-25T10:18:27+00:00 January 25th, 2011|IronPort, Loaders, Microsoft Exchange, Microsoft Threat Management Gateway, Software Updates, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

We have released an automatic update for the Vantage range of applications. This update includes some new loader formats, an experimental feature as well minor fixes and improvements. Of note, this release includes full support for Microsoft Exchange 2010 Tracking logs (previously supported with the Exchange 2007 loader, but missing a few fields), as well [...]

5 01, 2011

5 Top Tips for Safer Social Networking

By | 2011-01-05T13:43:50+00:00 January 5th, 2011|social networking, Tips and Best Practices, Uncategorized, WebSpy, WebSpy News Update|0 Comments

Majority of our social networking tips and ‘How to’ articles are aimed at organizations managing and reporting on network traffic to improve online safety at work. This time around I thought I share some tips focusing on how individuals can ensure they’re being smart and safe when engaging in social networking activities. Hopefully these tips [...]

22 12, 2010

Creating and Analyzing SonicWALL Log Files

By | 2010-12-22T15:28:52+00:00 December 22nd, 2010|Firewall Analysis, How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I’ve put together a couple of quick videos to show you how to configure logging on your SonicWALL appliance, and how to import and analyze these log files in WebSpy Vantage. You can also read through these steps on this page: Analyzing SonicWALL log files with WebSpy. […]

10 12, 2010

Detecting a distributed reflected DNS attack

By | 2010-12-10T15:52:57+00:00 December 10th, 2010|Cyber Crime, Firewall Analysis, How To, Log File Analysis, System Administration, Uncategorized, Vantage|0 Comments

The other night as I was getting ready to sleep, I received an email from the host of my personal Linux VPS saying that I had exceeded my monthly transfer quota. I didn't pay much mind to the warning, as the excess transfer was insignificant, and at that time I was too tired to care. I closed my email, got into bed and fell asleep.

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

10 12, 2010

Watch Latest Webinar – Web 2.0 in the Workplace today

By | 2010-12-10T13:08:40+00:00 December 10th, 2010|ClearSwift, How To, Sales and Marketing, Uncategorized, Vantage|0 Comments

In light of Clearswift’s (network security vendor and WebSpy technology partner) latest research report, Web 2.0 in the Workplace Today, WebSpy and Clearswift will host a series of webinars aimed at the channel. Even though the webinars are channel focused I thought I’d share the most recent one with all of you. It includes very [...]

10 12, 2010

Latest Research and 5 Tips for Managing Web 2.0 in the Workplace

By | 2010-12-10T12:26:46+00:00 December 10th, 2010|ClearSwift, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy News Update|0 Comments

Clearswift (network security vendor and WebSpy technology partner) recently released their first report, in a series of three, on the use of social media and web 2.0 in the workplace. From not wanting to touch social media with a ten foot pole, employers are these days increasingly aware of the benefits of social media and [...]

7 12, 2010

Who should take the responsibility for Adolescent Cyber Bullying?

By | 2010-12-07T12:34:52+00:00 December 7th, 2010|How To, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

I just read a long, but rather interesting, article on adolescent cyber bullying. Cyber bullying is legally defined as repeated harassment online, although in popular use, it can describe even a sharp-elbowed, unwarranted swipe online. We all know kids can be cruel because they often lack the maturity and empathy to understand the emotional ramifications [...]