ProxyInspector uses a unique technology, CrystalWeb, which allows it to display in its reports only the websites that the users have actually opened, so you don’t have to wade through tons of CDNs, advertising networks, telemetry sites, and other nonessential stuff.
Find out what your company’s employees are looking for on the Web (a new job, some goods or services, political discussions, terrorist or violent extremist propaganda, porn, etc.) before it becomes a real problem. Web search monitoring (Google, Bing, Yandex, YouTube, eBay, AliExpress, and many more).
Most videos viewed on YouTube have nothing to do with the employees’ duties, so their time at work is effectively wasted. ProxyInspector provides detailed information about each video viewed, including the website (YouTube, Vimeo, etc.), the title of the video, and the time spent on viewing it.
If an employee downloads software or game distribution packages, huge archives, ISO images, or HD videos, it may cause inconvenience to other employees by consuming the bandwidth and reducing Internet access speed, or even compromise information security (for example, if some executable files contain malicious code). Flexible, customizable reports on “undesirable” downloads.
Traffic reporting for all TCP/IP protocols supported by the Internet gateway (HTTP(S), FTP, SMTP, POP3/IMAP4, etc.). Traffic reporting by user, IP address, website, time of day, and date. This way, you can get a broad picture of Internet usage in your company.
ProxyInspector’s advanced features and set of reports are superior to those available in most UTMs’ built-in statistics. Moreover, it is much less expensive than the specialized solutions provided by UTM vendors (for example, FortiAnalyzer or Sophos iView).
SSH tunnels are widely used today to safely access some remote resources like MySQL and other servers.
Traditional way of using SSH tunnels in Windows includes installing Linux ports like CygWin or PuTTY and some scripting for auto-restarting.
Persitent SSH solves all of this problems, works as Windows system service and restarts SSH tunnels if needed, does not require any other libraries, ports or software.
And finally, you can monitor and manager Persistent SSH from anywhere through web interface and it is free for personal use on non-server Windows.
An effective tool for monitoring the corporate e-mail usage in Alt-N MDaemon и Microsoft® Exchange Server
MailDetective is a reporting solution for corporate e-mail system administrators. With MailDetective you can visualize the e-mail flow within your organization, estimate the personal/business correspondence ratio and recognize e-mail abuse. The analytic data collected with MailDetective can help you create and implement consistent enterprise-wide e-mail usage policy.
Log files processing and reporting on schedule, support for multiple mail servers with one installation, exporting report into PDF, Microsoft Excel and HTML. Support for Alt-N MDaemon, Microsoft® Exchange Server (all versions from 5.5 till 2016), Microsoft® Office 365, Kerio Mail Server, Kerio Connect 7, QMail and SendMail.
We are using ProxyInspector for a number of months now, and we are 100% satisfied by this application. It is simple to use, it has a good performance and it creates those reports where our management is asking for. And as our Internet users that the Internet usage is monitored they will be more careful on visiting nonbusiness websites.
Systems Administrator, Compensation Solutions (Pty) Ltd.
Would like to thank your company for a fantastic application. It has given us total control over our mail server so as to now allow graphs on peak business times as well as abuse of company time in relation to junk mail. This application has made my life a lot easier.
Bay Valley Medical Group
ProxyInspector is easy to use and the updated version finds the detail quickly and accurately. The product is very intuitive and allows you to drill down easily to the needed information when questions arise. The graphical reports have been utilized heavily by our management and HR teams.
Total Communications, Inc.
As far as I use ProxyInspector, I love it. It is the perfect adjunct to MS ISA. I couldn't get detail I needed without ProxyInspector. Great product: easy to install and use.
Network/System Administrator, Mountain Comprehensive Care Center
I love the ProxyInspector software. We used a competitor's software for years and due to a large increase in pricing we decided to look at other vendors. ProxyInspector is priced right and works so much faster than our old software. I can import 10GB of log files in minutes instead of hours. ( I actually had to use a usb stick with the old software because the import would time out) I can run the monthly report on the 10GB of log files in less than 2 minutes. This used to take me 30 to 45 minutes. Thanks for a great product.
Ballina Shire Council
I have been using winproxy for many years and always found the product reliable. However it wasn`t untill I used ProxyInspector for Winproxy that I could fully utilise the logs and create useful reports. This product is excellent and I compliment the developers for making an easy and useful reporting facility. It has all the features that I need.
Network Consultant, Downeast Networks, Inc.
I would like to say that your product is working very well in a couple of my client's environments. Each time I install an ISA Server 2004 server and the client needs to have clear, consise reporting that has scheduled report generation capabilities I recommend your product.
Network Administrator, Torgoviy dom "Avto"
I work as a system administrator and use ProxyInspector quite often to monitor visited websites. This program is built correctly from an IT specialist's point of view and offers many reporting features. My job made me look for a very good and, which is most important, easy-to-use program, ProxyInspector meets all requirements for a program of this kind.
Easter Seals Arc of Northeast Indiana
We love ProxyInspector. It is easy to use and has provided us with a tool we can use to improve efficiency and cut down on unnecessary Internet bandwidth use, as well as watch that employees are using the Internet for work related activities and staying away from dangerous sites.