Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Cybersitter

CYBERsitter 9.0 is designed primarily for home, educational and small business use. Even though CYBERsitter has been designed to be easily installed and used by the most inexperienced users, there are plenty of advanced features for power users too. New Features! Now records all Instant Messenger chat conversations for AOL (AIM), and Yahoo Messengers. Now you can know who your kids are chatting with to ensure that they are not communicating with strangers. Several new security enhancements have also been added for Windows 2000/ XP users. CYBERsitter provides over 30 categories of filtering making it the most complete Internet filter available. Filters are updated automatically, and there are no subscription charges. A sophisticated "content recognition" system recognizes and blocks new objectionable web sites even before we know about them. CYBERsitter allows parents to override blocked sites, add their own sites to block, specify allowable times to access the Internet, and maintains a detailed log of all Internet activity and violations. It will even send a daily report to parents by e-mail. Security - Many kids are much more computer literate than their parents. We recognize this, and the program is designed with this in mind. CYBERsitter has the most advanced anti-tampering functions available. Password protected, the settings you choose cannot be modified by even the most determined users. Advanced security features are available within the program to make it even more difficult to attempt to defeat or override the intentions of the parent or supervisor. CYBERsitter runs secretly in the background, always analyzing Internet activity, and can be configured to be completely invisible to the user and still accessible by the parent or supervisor.
Rating
0 vote
Favoured:
0

Listing Details

Vendor
Solid Oak Software
Website
Visit the Product Site
Pricing Model
Commercial
Modified
Never
Owner
michelemjordan
Created
2008-08-03
  • 24.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message