GFI Software enhances WebMonitor 2015
News|30 April 2015
GFI Software announces the availability of GFI WebMonitor® 2015 R2, the most powerful version yet of the company’s Web filter, management and security solution. WebMonitor 2015 allows IT administrators to monitor, manage and secure data from the Internet, protecting their business infrastructures from Web-based threats and compromised content.
GFI WebMonitor 2015 now offers WebInsights, a toolset that gives administrators the ability to attain robust intelligence into users’ web-based activities. It identifies points of interest immediately upon implementation, without having to run reports or drill down detailed dashboards. It also indicates current status on bandwidth usage, user activity and security incidents. WebInsights establishes a baseline and can then predict system behavior based on users’ prior activity.
Read more on the GFI website.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Related News
How HERE SDK keeps drivers moving when connectivity drops
Peak season is stressful enough without losing navigation mid-route. Rural “not-spots” and dead zones can derail deliveries fast. HERE SDK solves this with offline navigation and truck-aware routing, so your drivers stay on track, even when the signal disappears.
Adobe; Secure. Compliant. Built for Government
Adobe helps government teams cut complexity, boost efficiency, and deliver services that truly work. Modernization starts here.
The biggest cyber security threats to watch out for this Christmas
Don’t get caught out by Christmas cyber security threats The festive season is a time for celebration – but for cybercriminals, it’s also prime time for exploitation. As we shop, share, and connect online more than ever, the risks multiply....
The secret eighth layer of security: tools often overlooked
When we talk about cyber security, the conversation usually revolves around the seven layers of security – network, application, endpoint, and so on. They’re essential. But the real differentiator for modern businesses like yours isn’t just those seven layers. It’s the additional eighth layer of security – a proactive, intelligent approach that combines advanced tools and continuous validation. ...