SlideShare a Scribd company logo
Wavecrest Computing
Web Security, Visibility and Compliance Solutions
About Wavecrest Computing
• Celebrating 20 years in business
• Global partner and customer base
• GSA Schedule holder since 2000
• US based development and support teams
• Wavecrest clients including General Electric, Lockheed Martin, Florida
Department of Health, Siemens, Department of Homeland Security, and a
growing list of global enterprises and government agencies.
Employee Web-use Security & Management Solutions:
• Advanced Web Filtering
• Monitoring & Reporting Web-use Analytics
• Identify and Detect Cloud Services
• Bandwidth Monitoring & Throttling
• Forensic (detailed) audits
• BYOD (Guest Wifi Security)
Product Families
Web-Access Security Gateway
Flexible Deployment Options:
● Software
● Appliance
● Hybrid
● Cloud
Web-use Monitoring & Analytics
Supports over 100+ Log
Formats:
● Palo Alto Networks
● SonicWALL
● WatchGuard
● IronPort
Web-Access Security Gateway
• Meets Today’s Challenges - Manage cloud services, discover Shadow IT.
• Advanced Web Filtering - Configure policy exceptions by user or group.
• Threat Protection - Keep out malware, spyware, phishing, and more.
• Bandwidth Control - Configure thresholds to dynamically trigger caps.
• Regulatory Compliance - HIPAA, CIPA, and more.
• Comprehensive Reports - Accurate, interactive, and manager-ready.
• Distributed Workforce - Easily manage guest networks and BYOD.
Web-use Monitoring & Analytics
• Reporting Add-on - Generates actionable employee Web-use reports
• Analytics - Comprehensive detail in easy-to-understand charts.
• Drilldown - Detailed forensic-level reporting.
• Compatible - Supports all major firewall and gateway devices.
• Built-in Syslog Server - Directly connect Syslog-enabled devices.
• Cloud Visibility - Identify and Detect Cloud Services.
• Scalable - Most scalable log analysis product on the market.
Contact Information:
• Email: sales@wavecrest.net
• Phone: 877-442-9346 or 321-953-5351
• Website: https://www.wavecrest.net

More Related Content

PPTX
SWIFT CSP Presentations.pptx
PDF
briefing
PPTX
Cloud computing 10 cloud security advantages and challenges
PPTX
How to Achieve PCI Compliance with an Enterprise Job Scheduler
PDF
(SACON) Srinivas posarala - Challenges & Approach
PDF
Panda Security - Gatedefender
PPTX
Tech 2 Tech: increasing security posture and threat intelligence sharing
PDF
Protegendo sua rede
SWIFT CSP Presentations.pptx
briefing
Cloud computing 10 cloud security advantages and challenges
How to Achieve PCI Compliance with an Enterprise Job Scheduler
(SACON) Srinivas posarala - Challenges & Approach
Panda Security - Gatedefender
Tech 2 Tech: increasing security posture and threat intelligence sharing
Protegendo sua rede

What's hot (19)

PPTX
Card Data Discovery and PCI DSS
PPTX
PCI Compliance in the Cloud
PPTX
4 Essential Components of Office 365 Security
PPTX
1 final secnet_pci
PPTX
PCI Compliance in the Cloud
PDF
Becoming Unphishable
PDF
IT Security Services
PDF
eduTEAMS
PPTX
PCI DSS 2.0 Detailed Introduction
PPTX
GWAVACon 2013: Licensing session
PPTX
PCI DSS Compliance Checklist
PDF
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
PPTX
PCI DSS and PA DSS Compliance
PDF
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
PPTX
PCI Compliance in the Cloud
PPTX
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
PPTX
PCI DSS & PA DSS Version 3.0
PDF
TagCommander-Factsheet-PMS-EN-WEB
Card Data Discovery and PCI DSS
PCI Compliance in the Cloud
4 Essential Components of Office 365 Security
1 final secnet_pci
PCI Compliance in the Cloud
Becoming Unphishable
IT Security Services
eduTEAMS
PCI DSS 2.0 Detailed Introduction
GWAVACon 2013: Licensing session
PCI DSS Compliance Checklist
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
PCI DSS and PA DSS Compliance
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
PCI Compliance in the Cloud
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
PCI DSS & PA DSS Version 3.0
TagCommander-Factsheet-PMS-EN-WEB
Ad

Viewers also liked (16)

PPT
La Gallinita Roja
PDF
Boobalan-NMCS-2014
DOCX
PPS
La gallina y sus pollitos
PDF
Chanticleer Holdings
PDF
Widest Choice of Airfares Airfare Guide
PPTX
νέο παρουσίαση του Microsoft office power point
PDF
22.02.2016 buidling resilience in mongolia march 2016
PPTX
Kane County CHIP 2011-2016
PPTX
PresentAid-ChristmasCampaign2015-External
PPTX
EVIDENCIA 1 CALENTADOR SOLAR
PDF
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
PDF
22.02.2016 financial market developments of mongolia
PDF
Questões inss
PDF
Resumão ibge
La Gallinita Roja
Boobalan-NMCS-2014
La gallina y sus pollitos
Chanticleer Holdings
Widest Choice of Airfares Airfare Guide
νέο παρουσίαση του Microsoft office power point
22.02.2016 buidling resilience in mongolia march 2016
Kane County CHIP 2011-2016
PresentAid-ChristmasCampaign2015-External
EVIDENCIA 1 CALENTADOR SOLAR
Regenerating Engagement: Assessing Brand Benefits Associated with New York Ci...
22.02.2016 financial market developments of mongolia
Questões inss
Resumão ibge
Ad

Similar to About wavecrest Computing (20)

PPTX
5 Steps to Reduce Your Window of Vulnerability
PDF
Why Wavecrest
PDF
Cyblock Cloud - Effortless Integration With ConnectWise
PDF
How to Enable, Monitor, and Secure Your Remote Workforce
PDF
PPTX
SolarWinds Technology Briefing- San Diego CA
PDF
Why CyBlock Appliance
PDF
Web filterdatasheet us
PPTX
Chris Folkerd - UK Fast - eCommerce in the Cloud ERA
PDF
SD-WAN - comSpark 2019
PDF
Cyberteq - Cyber Security for Telecom.pdf
PPTX
Monitoring and Securing Active Directory Government Webinar for the US Army
PDF
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
PPTX
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
PDF
Securing The Clouds with The Standard Best Practices-1.pdf
PPTX
Managed Security in the Power Platform - Advanced Protection for an AI-Driven...
PDF
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
PPTX
Cyber_Security_Services_Presentation.pptx
PDF
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
PPTX
Past performance presentation
5 Steps to Reduce Your Window of Vulnerability
Why Wavecrest
Cyblock Cloud - Effortless Integration With ConnectWise
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds Technology Briefing- San Diego CA
Why CyBlock Appliance
Web filterdatasheet us
Chris Folkerd - UK Fast - eCommerce in the Cloud ERA
SD-WAN - comSpark 2019
Cyberteq - Cyber Security for Telecom.pdf
Monitoring and Securing Active Directory Government Webinar for the US Army
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
Securing The Clouds with The Standard Best Practices-1.pdf
Managed Security in the Power Platform - Advanced Protection for an AI-Driven...
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
Cyber_Security_Services_Presentation.pptx
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Past performance presentation

More from Wavecrest Computing (18)

PDF
Cyfin Reporting Capabilities Datasheet
PDF
Reporting Types and Smart Engine Analytics
PDF
Forensic Investigation of Employee Internet Activity
PDF
Why CyBlock Software
PDF
Why CyBlock Hybrid
PDF
MSP Partner Program
PDF
Interpreting Behavioral Analytics With Reliable Metrics
PDF
Authentication With Captive Portal
PDF
Big or Small, it can happen to your business!
PDF
Morning Tech Talk Cybersecurity
PDF
Cyfin Solution Brief
PDF
Detect, Analyze, and Manage Cloud Services in the Enterprise
PDF
Cyblock IOS App Datasheet
PDF
Cloud syncwith active Directory
PDF
CyBlock SSL Inspection Tech Brief
PDF
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
PDF
CyBlock Hybrid deployment
PDF
Cyblock Client Datasheet
Cyfin Reporting Capabilities Datasheet
Reporting Types and Smart Engine Analytics
Forensic Investigation of Employee Internet Activity
Why CyBlock Software
Why CyBlock Hybrid
MSP Partner Program
Interpreting Behavioral Analytics With Reliable Metrics
Authentication With Captive Portal
Big or Small, it can happen to your business!
Morning Tech Talk Cybersecurity
Cyfin Solution Brief
Detect, Analyze, and Manage Cloud Services in the Enterprise
Cyblock IOS App Datasheet
Cloud syncwith active Directory
CyBlock SSL Inspection Tech Brief
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
CyBlock Hybrid deployment
Cyblock Client Datasheet

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
PPTX
Machine Learning_overview_presentation.pptx
Tartificialntelligence_presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
SOPHOS-XG Firewall Administrator PPT.pptx
1. Introduction to Computer Programming.pptx
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation_ Review paper, used for researhc scholars
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx

About wavecrest Computing

  • 1. Wavecrest Computing Web Security, Visibility and Compliance Solutions
  • 2. About Wavecrest Computing • Celebrating 20 years in business • Global partner and customer base • GSA Schedule holder since 2000 • US based development and support teams • Wavecrest clients including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies.
  • 3. Employee Web-use Security & Management Solutions: • Advanced Web Filtering • Monitoring & Reporting Web-use Analytics • Identify and Detect Cloud Services • Bandwidth Monitoring & Throttling • Forensic (detailed) audits • BYOD (Guest Wifi Security)
  • 4. Product Families Web-Access Security Gateway Flexible Deployment Options: ● Software ● Appliance ● Hybrid ● Cloud Web-use Monitoring & Analytics Supports over 100+ Log Formats: ● Palo Alto Networks ● SonicWALL ● WatchGuard ● IronPort
  • 5. Web-Access Security Gateway • Meets Today’s Challenges - Manage cloud services, discover Shadow IT. • Advanced Web Filtering - Configure policy exceptions by user or group. • Threat Protection - Keep out malware, spyware, phishing, and more. • Bandwidth Control - Configure thresholds to dynamically trigger caps. • Regulatory Compliance - HIPAA, CIPA, and more. • Comprehensive Reports - Accurate, interactive, and manager-ready. • Distributed Workforce - Easily manage guest networks and BYOD.
  • 6. Web-use Monitoring & Analytics • Reporting Add-on - Generates actionable employee Web-use reports • Analytics - Comprehensive detail in easy-to-understand charts. • Drilldown - Detailed forensic-level reporting. • Compatible - Supports all major firewall and gateway devices. • Built-in Syslog Server - Directly connect Syslog-enabled devices. • Cloud Visibility - Identify and Detect Cloud Services. • Scalable - Most scalable log analysis product on the market.
  • 7. Contact Information: • Email: sales@wavecrest.net • Phone: 877-442-9346 or 321-953-5351 • Website: https://www.wavecrest.net