The Rawstream for Chrome agent requires that users sign in using a Google account. The Google account can be either the organisation’s own account or a personal Gmail account. Organisations however may prefer that users do not sign in with their Gmail accounts. We have released an update enabling IT admins to block staff from ..
…then we have great news for you! We saw the need for an on-premise solution to complement our Cloud DNS, so we built Rawstream Network DNS
New feature just out for our Rawstream for Chrome users: Rawstream keeps a log of the videos seen by each user including the video’s title and time spent watching each video. The report show you the full set of videos and the total time spent watching each video for the selected day. To get a user’s log, simply select the user from ..
Rawstream allows you to enforce Google SafeSearch for all guest devices that connect to the network. Google SafeSearch helps schools and organizations avoid adult content from appearing in search results. SafeSearch is a useful tool and most organizations would want to enable it. SafeSearch For Guest Devices If you have a BYOD policy with devices connecting via ..
Tanaza provide affordable cloud managed wifi hotspots that are simple to use and work great. We are happy to announce that Tanaza now supports Rawstream’s DNS-based web filtering. Tanaza customers need to do the following simple steps: Create an account on Rawstream.com Go to Settings > Networks Click Add New Network For networks with static public IPs customers ..
The latest release of the Rawstream for ChromeOS Agent – version 3.0.8 is out – and we’ve included a key feature that you’ve been asking for! Rawstream for Chrome allows you to monitor web traffic for Chromebooks and other ChromeOS devices. Very handy for schools and businesses who are moving to a Google ecosystem. The agent works everywhere, including off-campus ..
Ben Kepes has a post up discussing the dangers of Rogue IT and why IT departments don’t like to say no, but have to. Illustrating with examples of Rogue IT, Ben’s conclusion is that both sides – IT and business users – should talk and understand each other’s position, a detente if you will. But ..
Productivity – In the dim distant past when we still though Charles might be king one day and The King was still walking in Memphis; I worked in a factory for a while. I was an engineer keeping a line of machines running. At the end of each line was a large board declaring yesterday’s ..
Web monitoring solutions are used to monitor web site access. That is a given. But what if the data being collected does not represent a true and fair view of a user’s activity online? In the case of social websites such as Facebook, Twitter and Linkedin, no web filtering solution shows an accurate view of ..
How it works We have an innovative method to support per-user policies based on agent technology. The agent acts as a DNS proxy on the machine – the machine uses the agent as the DNS server and the agent then reponds to the DNS queries. Internal domains continue to resolve normally. Internet activity is monitored ..