Today I was speaking to a customer that had the following reporting request. “I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic”. This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There’s a simpler method.
I’m frequently asked how WebSpy Vantage utilizes a systems CPU resources. Sometimes you may notice Vantage utilizing 100% of your machine’s CPU power, and other times it will be hardly touched. So here is an overview of how the software works internally so you can understand when your CPUs will and won’t be pushed.
We’ve just released an auto update for WebSpy Vantage (Premium, Giga and Ultimate) as well as the Web Module. This is a great update for Vantage Ultimate users as we’ve introduced a new feature/tab into the Web Module called ‘Dynamic Reports’.
Here’s the full list of changes since the last auto update (184.108.40.206 on the 14th April 2010).
Microsoft Forefront Threat Management Gateway (TMG) popularity is starting to pick up. WebSpy added support for analyzing and reporting on TMG logs even before the public release and have been improving our compatibility ever since.
I’m actually not trying to compare WebSpy Vantage with Google Analytics (GA), it’s like comparing apples and oranges. Both solutions provide powerful ways of tracking how visitors find your site and how they navigate through it, ideally giving you rich insights into your website traffic and marketing effectiveness. However, GA is a pure web analytics …
It’s been a crazy few weeks but we’ve finally managed to get the first release of WebSpy Soho out the door.
It is our intention to keep our Alpha testers up to date with our ongoing development. Right now, I’d like to inform you about some issues experienced by a handful of testers and how to go about resolving them.
I’ve been having a look through the reporting functionality included in Microsoft Forefront Threat Management Gateway to find that not much has changed from ISA Server 2006. There is some new information regarding the newly implemented URL categorization and threat management technology, but there is very little flexibility or customization for those with reporting requirements beyond general overviews cluttered with irrelevant information. Here is what I consider to be the 8 main limitations of Microsoft Forefront TMG’s reporting functionality.
Browse for awesome porn! Find awesome porn and then attach it to a group email, sent to everyone who works with you in accounting… Overrun your lunch hour by 4 hours because poker_champ03 is beating you at 5 card stud… Write an email to your lover describing in intimate details what you would like to …
International Business Times (IBT) recently reported that “Many young people are turning to proxy servers to get round their school’s internet security systems to access banned websites, including social networks and gaming sites.”
“If network administrators simply instituted proper configuration policies and conducted good network monitoring, about 80 percent of commonly known cyber attacks could be prevented.”