9 09, 2009

Exciting New Features in Vantage Update 2.2.0.10

By | 2009-09-09T07:27:29+00:00 September 9th, 2009|Loaders, Log File Analysis, Microsoft Threat Management Gateway, Scheduled Tasks, Software Updates, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

Attention all Vantage customers (and triallers). We've just released build 2.2.0.8 as an auto-update. This build includes new features such as scheduled data purge, support for Microsoft Forefront Threat Management Gateway, and scheduling CSV imports into your Organizational structure.

2 09, 2009

Internet Monitoring Best Practices – 10 Valuable Tips

By | 2009-09-02T13:43:44+00:00 September 2nd, 2009|Tips and Best Practices, Uncategorized, WebSpy|0 Comments

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend [...]

25 08, 2009

WebSpy User Survey – The Why, How and What Behind Internet Monitoring

By | 2009-08-25T03:10:33+00:00 August 25th, 2009|Log File Analysis, Sales and Marketing, Software Updates, Uncategorized, WebSpy|0 Comments

We recently completed the analysis of our latest software user survey. It is always very exciting to review the results from such a survey since it is one of the best indications on why clients are using our software, where our strengths lies and what we can improve. […]

20 08, 2009

Social Media – The Biggest Shift Since the Industrial Revolution?

By | 2009-08-20T07:57:13+00:00 August 20th, 2009|Sales and Marketing, Uncategorized, WebSpy|0 Comments

I just came across something I wanted to share. Socialnomics.com recently posted a very powerful video, “Social Media Revolution”, highlighting figures from Erik Qualman’s book on how social media transform the way we live and do business. Being a part of industry, it comes as no surprise that the popularity of social media is rapidly [...]

14 08, 2009

Increase importing speed by utilizing dates in log file names

By | 2009-08-14T06:21:10+00:00 August 14th, 2009|How To, Log File Analysis, Uncategorized, Vantage, WebSpy|0 Comments

Using Date Modifiers in file masks are a great way to increase the speed of your imports as they remove all the logs you don’t care about from the import list. If you're using WebSpy Vantage, you are probably interested in filtering your log file imports by date (only import files from the month of June for example). The obvious way to do this is to specify a date filter using the filters page in the Input Wizard. The problem is Vantage will still check every record in every log file being imported to see if it matches the date filter. If you have months or years worth of logs in the folder being imported, that's a lot of data that Vantage has to pointlessly sift through. The good news is, if your log files contain the date in their file name, then you can use file masks to instruct Vantage to never touch these unwanted files.

11 08, 2009

Video: Setup a complete Internet monitoring solution in less than 15 minutes!

By | 2009-08-11T07:59:31+00:00 August 11th, 2009|Analyzer, How To, Live, Log File Analysis, Sentinel, Uncategorized, Web Browsing Analysis, WebSpy|0 Comments

Here's a video I put together demonstrating how to get up and running with a complete monitoring and reporting solution in less than 15 minutes. The video demonstrates three products: WebSpy Sentinel, for complete data capture, WebSpy Live for real time alerts, and WebSpy Analyzer Standard for analysis and reporting.

20 07, 2009

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

By | 2009-07-20T04:23:25+00:00 July 20th, 2009|Analyzer, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|2 Comments

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We've therefore created a modified version of the script that creates compatible log files for WebSpy software.

16 07, 2009

Video: How To Remove Clutter From Your Web Reports

By | 2009-07-16T09:10:02+00:00 July 16th, 2009|How To, Log File Analysis, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites visited by people in your organization, I'm sure you know what I mean. Watching a single video on YouTube will probably generate a list of about three to five sites such as lax-v41.lax.youtube.com, www.youtube.com, img.youtube.com, and so on. Your list of top sites also probably contains hits to ad servers and tracking servers, such as doubleclick.net, google-analytics.com and imrworldwide.com. All this clutter gets in the way of determining what sites were 'intentionally' visited.