Web, E-mail and IP Network Traffic content Monitoring, Blocking and
evaluation and installation guide is available from our downloads
page. Please note that an activation key is required - please E-mail
to firstname.lastname@example.org with
your full contact details to receive activation key by E-mail.
Predator is an Internet and Network security activity monitor.
filtering and collection of SMTP / POP3 E-mail content.
security and activity monitor of IP traffic content
and collection of SMTP / POP3 E-mail content
and Alerting options
"sniffing" for key words
Logging of browser activity, per user, where they visited, when
and for how long
client IP address, the PC Name, Logon name and Full Name
In Real-Time it
sniffs all Internet/entrant/extranet traffic to and from the clients browser looking
for key words in the content. When specified key words are encountered an alert
can be generated and a message sent to a manager/administrator of the activity,
so the appropriate action can be taken.
Predator logs browser activity, so you can see what your traffic
patterns are, who visited what site and when. It identifies the
client IP address and it will tell you the PC Name, and the user
logged onto that PC at the time, Logon name and Full Name (provided
they are using Microsoft Windows and Microsoft Networking).
Predator has several pages of tree views (Like Explorer) so you
can drill down to report more detail such as:
sites were visited per user
users visited any particular site
sites were visited by any particular workstation
pages users viewed
long they were looking at each page
violated words have been used and by whom
Why do you need it?
- Justify use of
company resources for appropriate business use - this includes use of computer
hardware, network utilization and bandwidth and communication costs for Internet
access itself. This helps reduce costs and increase the company's bottom line.
behavior needs to be identified and stopped at source - offensive behavior can
include the display of images of a sensitive, obscene or inappropriate nature
on a workstation screen. This can have a direct impact on inter-personnel relationships
in the work place.
- Ensure your employees
are working when they should be, and if allowed to use resources for "leisure"
that this is at the appropriate time and does not impact on the company or individuals
due to the inappropriate use of the Internet or company network.
that prove the case
magazines quote 90 minutes per day of non-business surfing. This
equates to one full working day each week and NINE weeks per user
a user spends only 10 minutes a day, looking at non business related
material on the web, this has cost you the equivalent of more
than a weeks salary (based on 220 working days per year and a
36 hour working week.
nature is such that discovery of a site which would be considered
inappropriate in a work context, is likely to quickly be circulated
amongst work colleagues and also external contacts.
Advantages of Cyber Predator: Most
security/monitoring tools get their information from proxy server
log files - Cyber Predator does not and as a result provides significant
servers normally only provide the users logon ID (in a Microsoft
environment Cyber Predator will give you the users Full Name, ideal
for colleges/universities where users have non obvious logon IDs).
will tell you how many seconds each page was viewed by each user.
information is historical (Cyber Predator works in Real-Time).
servers cost money (Cyber Predator doesn't need a proxy server
to perform its function).
servers log the URL's that users type into the address box in their
browsers. If this doesn't contain the key words being "watched
for" then the suspicious or inappropriate activity is missed.
Cyber Predator sniffs all data on the network, to and from the
browser, thereby allowing it to pick up any occurrence of a key
word in any part of the data, not just the URL.
Servers only log traffic going through them, which in the main
does not include Intranet traffic. (Cyber Predator monitors all
browser traffic on your network).
is NO client software to install on any or every PC, just install
Cyber Predator onto an NT4+ platform and that's it.
tools provide blocking of sites so the user can't see them at all,
a good idea, but:-
of them block the whole site, so the 99% of useful information
on that site is also blocked.
of them require continuous updating, adding URL's of specific categories
of sites, taking time and expense to maintain.
on constant updates means such products are out of date almost
all of the time. CyberPredator offers a proactive approach rather
can be a performance overhead with some tools as they "sit"
in the data stream. Cyber Predator listens unobtrusively to the
data, with no impact on performance.
The main monitor program runs as a service on a PC running Microsoft
Windows XP (Workstation or Server Version 4 or Windows 200X ), for
NT4 32Mb RAM, 500mb disk, for W2K 64Mb, 2Gb disk, Ethernet card
that supports promiscuous mode (Most Ethernet cards do).
Ethernet network (LAN) that connects all your PC's together.
users to monitor.
It is not necessary
to be running Microsoft Windows on the users PC's as long as they access
the Internet/intranet/extranet using TCP/IP across your local LAN.
The Cyber Predator suite consists of:-
Data Collector: this runs on Windows XP (Workstation or Server
Version 4 or Windows 200X ), and sniffs the network, monitoring
and logging activity.
Violation Console: this collects the messages generated by the
Real-Time Data Collector, this is normally run on an administrator
or managers PC.
Reporter: this reads the log files, and lets you see who is surfing
where, the violations that have occurred and shows you usage graphs.
- Setup Program:
this is where all the main setup and configuration is done.
A live evaluation
and installation guide is available from our downloads
page. Please note that an activation key is required - please E-mail to email@example.com
with your full contact details to receive activation key by E-mail.