4 04, 2011

Vantage Video Series: #2 Preflight & Installation

By | 2011-04-04T13:16:01+00:00 April 4th, 2011|How To, Log File Analysis, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Module|0 Comments

This is the second of a series of videos showing you how to configure Vantage in detail. This video will take you through the system requirements, and the installation of Vantage and the Web Module. WebSpy Vantage Ultimate - Preflight and Installation from Fastvue on Vimeo.

10 12, 2010

Watch Latest Webinar – Web 2.0 in the Workplace today

By | 2010-12-10T13:08:40+00:00 December 10th, 2010|ClearSwift, How To, Sales and Marketing, Uncategorized, Vantage|0 Comments

In light of Clearswift’s (network security vendor and WebSpy technology partner) latest research report, Web 2.0 in the Workplace Today, WebSpy and Clearswift will host a series of webinars aimed at the channel. Even though the webinars are channel focused I thought I’d share the most recent one with all of you. It includes very [...]

7 12, 2010

Who should take the responsibility for Adolescent Cyber Bullying?

By | 2010-12-07T12:34:52+00:00 December 7th, 2010|How To, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

I just read a long, but rather interesting, article on adolescent cyber bullying. Cyber bullying is legally defined as repeated harassment online, although in popular use, it can describe even a sharp-elbowed, unwarranted swipe online. We all know kids can be cruel because they often lack the maturity and empathy to understand the emotional ramifications [...]

27 10, 2010

Google Claim 6.4% of Internet traffic. Help us put this to the test

By | 2010-10-27T02:54:13+00:00 October 27th, 2010|How To, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

According to recent report, Google has a record slice, 6.4%, of the world’s Internet traffic. An accurate figure? Well, we wanted to put this claim to the test and therefore started off by investigating the share of WebSpy’s traffic to Google sites. We also encourage our Vantage and Analyzer users to do the same thing [...]

19 07, 2010

Tips from TMG Expert: Changing WebSpy Vantage Scheduled Task Recurrence Interval

By | 2010-07-19T03:57:08+00:00 July 19th, 2010|How To, Microsoft ISA Server, Microsoft Threat Management Gateway, Uncategorized|0 Comments

Microsoft ISA Server and Forefront TMG users are probably familiar with isaserver.org’s informative news articles, tutorials, blogs and forums. I just wanted to bring your attention to one of isaserver.org’s contributing blog authors, Richard Hicks. Richard has been working with Forefront Threat Management Gateway (TMG) 2010 and its predecessors for more than 12 years. He [...]

12 07, 2010

Website Categorization – Assessing Productivity

By | 2010-07-12T07:46:02+00:00 July 12th, 2010|How To, Uncategorized|0 Comments

Security and Threat Management solutions, such as Microsoft Forefront TMG, IronPort and Blue Coat, use predefined URL categorization to simplify blocking and filtering management. Different security vendors have different ways of categorizing websites but it generally involves referring to a gigantic, regularly updated database of millions of websites sorted into 50-100 relevant categories. Majority of [...]

12 05, 2010

Dedicated WebSpy and Forefront TMG pages – Everything you need to know about TMG Log Reporting

By | 2010-05-12T04:14:53+00:00 May 12th, 2010|How To, Microsoft Threat Management Gateway, Reports, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy|0 Comments

Microsoft Forefront Threat Management Gateway (TMG) popularity is starting to pick up. WebSpy added support for analyzing and reporting on TMG logs even before the public release and have been improving our compatibility ever since. […]

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]