iPrism Comprehensive On-Box Reporting

iPrism offers a wide range of standard and customizable reports on-box with no additional hardware or software required to easily generate the management reports you need. Today's organizations depend on the Internet but the Web is fraught with threats both external - from botnets, spyware, malware and phishing, and internal - through employee abuse or negligence. You may have written a solid and binding Acceptable Use Policy (AUP) or Security Policy but how can you know if your users are abiding by the policies.

Reporting is a critical tool that supplies the visibility you need to assure that internal policies are being enforced and the proof required to make sure you are complying with regulatory requirements such as CIPA, HIPPA, SOX, GLBA and others.

iPrism Web Security Reporting Features

Accurate Filtering Means Accurate Reporting
Most software-based solutions use "pass-by" filtering technology. The trouble with pass-by is that it can be overwhelmed when Internet traffic is high, resulting in missed packets. If a packet slips past your filtering solution, so does the opportunity to report on it because, from the solution's perspective, the event never occurred. However, the reality is that the event did occur and because of this scenario you have introduced doubt into the accuracy of your reporting. 

With iPrism Web Security's next-generation kernel-level filtering and transparent bridge deployment, you no longer have to worry about missed packets and you can ensure that your reports are generated from accurate and reliable data, and presented in a meaningful format.

Long-Term Data Log Retention
iPrism allows you to retain Internet data logs on-box to assure you can address legal or regulatory compliance issues with accurate historical reporting should the need arise. Your organization's Internet usage data can be retained for up to a year, depending on the number of workstations and volume of Web traffic.

Email Alerts
When acceptable use or security policy infractions occur, or when circumvention attempts, malware or other problems are detected by your iPrism, you are immediately notified via email that an event has occurred. This allows you sufficient time to react and remediate problems, assuring you stay one step ahead of emerging threats.

Real-Time Monitoring (RTM)
With this features you can monitor your web and application traffic on-demand. And you can configure RTM to monitor all or per-user traffic or only those critical events occurring outside of your acceptable use policy or security policies. In those cases, RTM becomes an important diagnostic tool, helping you determine where security holes have opened and where policy violations are occurring.

Comprehensive Reporting That's Easy-to-Use
The on-box reporting package includes tools such as the Report Wizard that make obtaining and presenting the information you need easy and intuitive. Using the Report Wizard, you can create a report from scratch or use a pre-existing report template. The Wizard walks you through all the necessary steps from the criteria you want to apply through to a finished report. You can create reports for multiple types of web and application traffic so you are assured thorough reporting coverage of your entire organization.

Tabular Views Mean Drill-Down Efficiency
The iPrism Web Security reporting package is the only solution that offers tabular reporting views as you drill down. This means that you can create a report, drill-down to a different view, and access your previous view via tabs along the top of the screen. This unique feature gives you the maximum flexibility to explore your data dynamically, without running multiple reports or losing unsaved reports. It also allows you to quickly compare data between multiple reports.