Blocking Rawstream for Chrome Gmail Signins

The Rawstream for Chrome agent requires that users sign in using a Google account. The Google account can be either the organisation’s own account or a personal Gmail account. Organisations however may prefer that users do not sign in with their Gmail accounts. We have released an update enabling IT admins to block staff from ..

YouTube and TED Per-User Reporting

YouTube and TED Per-User Reporting

New feature just out for our Rawstream for Chrome users: Rawstream keeps a log of the videos seen by each user including the video’s title and time spent watching each video. The report show you the full set of videos and the total time spent watching each video for the selected day. To get a user’s log, simply select the user from ..

Enforce Google Safe Search for guest devices with Rawstream DNS

Rawstream allows you to enforce Google SafeSearch for all guest devices that connect to the network. Google SafeSearch helps schools and organizations avoid adult content from appearing in search results. SafeSearch is a useful tool and most organizations would want to enable it. SafeSearch For Guest Devices If you have a BYOD policy with devices connecting via ..

How to use Rawstream Content Filtering with Tanaza Cloud Managed WiFi hotspots

Tanaza provide affordable cloud managed wifi hotspots that are simple to use and work great. We are happy to announce that Tanaza now supports Rawstream’s DNS-based web filtering. Tanaza customers need to do the following simple steps: Create an account on Rawstream.com Go to Settings > Networks Click Add New Network For networks with static public IPs customers ..

Rawstream for Chromebooks – Support for public wifi hotspots

Rawstream for Chromebooks – Support for public wifi hotspots

The latest release of the Rawstream for ChromeOS Agent – version 3.0.8 is out – and we’ve included a key feature that you’ve been asking for! Rawstream for Chrome allows you to monitor web traffic for Chromebooks and other ChromeOS devices. Very handy for schools and businesses who are moving to a Google ecosystem. The agent works everywhere, including off-campus ..

Shadow IT – why vendors are still in the dark about New IT

Shadow IT – why vendors are still in the dark about New IT

Ben Kepes has a post up discussing the dangers of Rogue IT and why IT departments don’t like to say no, but have to. Illustrating with examples of Rogue IT, Ben’s conclusion is that both sides – IT and business users – should talk and understand each other’s position, a detente if you will. But ..

Engage brain and engage staff

Engage brain and engage staff

Productivity – In the dim distant past when we still though Charles might be king one day and The King was still walking in Memphis; I worked in a factory for a while. I was an engineer keeping a line of machines running. At the end of each line was a large board declaring yesterday’s ..

Why your existing web filtering product is misleading you

Why your existing web filtering product is misleading you

Web monitoring solutions are used to monitor web site access. That is a given. But what if the data being collected does not represent a true and fair view of a user’s activity online? In the case of social websites such as Facebook, Twitter and Linkedin, no web filtering solution shows an accurate view of ..

How-To: User-Based Filtering

How-To: User-Based Filtering

How it works We have an innovative method to support per-user policies based on agent technology. The agent acts as a DNS proxy on the machine – the machine uses the agent as the DNS server and the agent then reponds to the DNS queries. Internal domains continue to resolve normally. Internet activity is monitored ..