Compliance and reporting requirements create a need to store Internet and user activity logs for extended periods. In addition, dynamic access to this data is required to identify and resolve obscure threats lurking in the logs. Reliance on static reports and logs creates difficult, time-consuming searches.
By proactively indexing and archiving network data as it is developed, iboss SWG Reporter and Log Management provide administrators instant access to detailed user information regardless of whether it occurred yesterday or a year ago. These tools give network administrators instant insight on user activity, threats, and the consumers using the network’s resources. Gone are the days of cumbersome reporting!
The need for dynamic access for data becomes a growing concern for organizations as static report generation does not provide the flexibility to compare and contrast information in a reasonable time frame. iboss SWG Reporter provides dynamic indexing of data and sorts it into a drill down archive. This provides access to all events for the day, with the ability to instantly jump to compare throughout the year.
With the powerful indexing features of the iboss SWG Reporter, access to any and all events are provided through a dynamic drill-down interface that reveals user details. This dynamic access creates new ways on how network activity can be used. Instantly create analytical comparisons between date ranges for bandwidth or user activity, identify trends brewing on the network, or utilize for forensic style investigations.
SWG Threat and Event Reporter expands network insight to provide packet level detail tracking violations, threat and bandwidth GeoMapping, data loss, intrusion , and bandwidth consumption. Easily view activity and violations from entire groups to individual users. User based reports detail all port, application, and IP accesses to and from the network. Detailed graphs and heat maps provide information on user and traffic allowing network administrators to adjust network layouts, customize ?filtering, and identify risk before they become a problem. This is essential to for compliance as well as mitigating threats.
This reports web usage and statistics such as bandwidth activity, web category usage, top visited domains, top blocked domains, and last visited sites — all with drill down details. This information is provided down to the user.