Pcounter Pro
Pcounter Station
Pcounter Workstation
Cyber Predator
LT Auditor+
LT Auditor+ Assessment
Price Quotes
Contact SMIS

Cyber Predator

Internet, Web, E-mail and IP Network Traffic content Monitoring, Blocking and Alerting

A live evaluation and installation guide is available from our downloads page. Please note that an activation key is required - please E-mail to info@smis.net with your full contact details to receive activation key by E-mail.

Cyber Predator is an Internet and Network security activity monitor.

Includes filtering and collection of SMTP / POP3 E-mail content.

  • Internet/Network security and activity monitor of IP traffic content
  • Filtering and collection of SMTP / POP3 E-mail content
  • Blocking and Alerting options
  • Real-Time "sniffing" for key words
    Logging of browser activity, per user, where they visited, when and for how long
  • Identifies client IP address, the PC Name, Logon name and Full Name

In Real-Time it sniffs all Internet/entrant/extranet traffic to and from the clients browser looking for key words in the content. When specified key words are encountered an alert can be generated and a message sent to a manager/administrator of the activity, so the appropriate action can be taken.

Cyber Predator logs browser activity, so you can see what your traffic patterns are, who visited what site and when. It identifies the client IP address and it will tell you the PC Name, and the user logged onto that PC at the time, Logon name and Full Name (provided they are using Microsoft Windows™ and Microsoft Networking).

Cyber Predator has several pages of tree views (Like Explorer) so you can drill down to report more detail such as:

  • What sites were visited per user
  • Which users visited any particular site
  • What sites were visited by any particular workstation
  • Which pages users viewed
  • How long they were looking at each page
  • Which violated words have been used and by whom

Why do you need it?

  • Justify use of company resources for appropriate business use - this includes use of computer hardware, network utilization and bandwidth and communication costs for Internet access itself. This helps reduce costs and increase the company's bottom line.
  • Inappropriate behavior needs to be identified and stopped at source - offensive behavior can include the display of images of a sensitive, obscene or inappropriate nature on a workstation screen. This can have a direct impact on inter-personnel relationships in the work place.
  • Ensure your employees are working when they should be, and if allowed to use resources for "leisure" that this is at the appropriate time and does not impact on the company or individuals due to the inappropriate use of the Internet or company network.

Statistics that prove the case …

  • Some magazines quote 90 minutes per day of non-business surfing. This equates to one full working day each week and NINE weeks per user per year!
  • if a user spends only 10 minutes a day, looking at non business related material on the web, this has cost you the equivalent of more than a weeks salary (based on 220 working days per year and a 36 hour working week.
  • Human nature is such that discovery of a site which would be considered inappropriate in a work context, is likely to quickly be circulated amongst work colleagues and also external contacts.

Advantages of Cyber Predator:
Most security/monitoring tools get their information from proxy server log files - Cyber Predator does not and as a result provides significant advantages:

  • Proxy servers normally only provide the users logon ID (in a Microsoft environment Cyber Predator will give you the users Full Name, ideal for colleges/universities where users have non obvious logon IDs).
  • It will tell you how many seconds each page was viewed by each user.
  • The information is historical (Cyber Predator works in Real-Time).
  • Proxy servers cost money (Cyber Predator doesn't need a proxy server to perform its function).
  • Proxy servers log the URL's that users type into the address box in their browsers. If this doesn't contain the key words being "watched for" then the suspicious or inappropriate activity is missed. Cyber Predator sniffs all data on the network, to and from the browser, thereby allowing it to pick up any occurrence of a key word in any part of the data, not just the URL.
  • Proxy Servers only log traffic going through them, which in the main does not include Intranet traffic. (Cyber Predator monitors all browser traffic on your network).
  • There is NO client software to install on any or every PC, just install Cyber Predator onto an NT4+ platform and that's it.

Other tools provide blocking of sites so the user can't see them at all, a good idea, but:-

  • Most of them block the whole site, so the 99% of useful information on that site is also blocked.
  • Most of them require continuous updating, adding URL's of specific categories of sites, taking time and expense to maintain.
  • Relying on constant updates means such products are out of date almost all of the time. CyberPredator offers a proactive approach rather than reactive.
  • There can be a performance overhead with some tools as they "sit" in the data stream. Cyber Predator listens unobtrusively to the data, with no impact on performance.

Technical Overview:

Software requirements
The main monitor program runs as a service on a PC running Microsoft Windows XP (Workstation or Server Version 4 or Windows 200X ), for NT4 32Mb RAM, 500mb disk, for W2K 64Mb, 2Gb disk, Ethernet card that supports promiscuous mode (Most Ethernet cards do).

  • An Ethernet network (LAN) that connects all your PC's together.
  • Some users to monitor.

It is not necessary to be running Microsoft Windows™ on the users PC's as long as they access the Internet/intranet/extranet using TCP/IP across your local LAN.

Cyber Predator Components:
The Cyber Predator suite consists of:-

  • Real-Time Data Collector: this runs on Windows XP (Workstation or Server Version 4 or Windows 200X ), and sniffs the network, monitoring and logging activity.
  • Real-Time Violation Console: this collects the messages generated by the Real-Time Data Collector, this is normally run on an administrator or managers PC.
  • Historical Reporter: this reads the log files, and lets you see who is surfing where, the violations that have occurred and shows you usage graphs.
  • Setup Program: this is where all the main setup and configuration is done.

A live evaluation and installation guide is available from our downloads page. Please note that an activation key is required - please E-mail to info@smis.net with your full contact details to receive activation key by E-mail.