Products > Pearl Software > Solutions
Website•Echo is a stand-alone module contained within Pearl Echo•Suite. Website?Echo provides network administrators with a comprehensive tool to monitor and control access to specific web sites or general categories of web sites. Using Website?Echo, administrators can set web access permissions based on time controls, enabling the lock-down of machines in after-hours periods or providing freer access during personal time for day-extender employees. Website?Echo also allows the use of keyword triggering as a means to audit or control access to web sites. Pearl Software also sells Echo?Filters, a web categories plug-in that complements Website?Echo by providing the most comprehensive and up-to-date list of web categories used to define the enterprise’s web access policy.
Website•Echo provides user-level monitoring and web site access policies in a client-server, server-centric and peer-to-peer computing environment. With a click of a mouse, Website?Echo allows you to easily view how much time users are spending online. For in-depth analysis, Website?Echo includes an enterprise-class report manager with over forty standard reports that can be customized and run interactively or be scheduled for automatic generation and distribution based on your existing Directory users and groups.
Website?Echo’s powerful Mobility Monitor™ accommodates customers who are concerned about the continuity of their web site usage policies extending beyond the company’s internal network. Website?Echo also caters to thick or thin client workstations in a Terminal Services and Citrix MetaFrame environment.
Forrester Research finds that one in every 10 Web sites is infected with malware. Website?Echo provides network administrators with a comprehensive tool to monitor, filter and control access to web sites based on the enterprise’s Internet Acceptable Use Policy.
Control Website usage through a robust set of web access parameters
Tailor Website access for specific Directory users or groups of users
Designate permissions to general categories of web sites, such as Peer-to-Peer download sites, XXX, gaming, shopping, etc.
Increase management's awareness by providing informative reports that are automatically generated and distributed to management, users and auditors
Define web-access time controls that lock-down unattended machines in after-hours while providing greater flexibility for day-extenders
Exempt trusted web sites or domains from the blocked domain list and block specific domains from otherwise available categories
Automatically maintain blocked domain list through the user of Echo?Filters™
Categorize surfing habits and provide insight into the amount of time and cost users spend on the web
Server Hardware Recommendations (Administration Machine)
A Windows server or workstation with an IP address or Fully Qualified Domain Name (FQDN) that can be directly or indirectly (NAT) accessed by the workstations you intend to monitor.
Minimal hardware specifications for optimal performance (250 users) include:
Pentium 4, 2.4 GHz processor or greater
1 GB RAM
At least 1 GB of free disk space
Operating Systems Compatibility
Windows Server 2008
Windows Server 2003, including SP1
Windows XP Professional SP1 or higher
Windows 2000 SP4 or higher (Professional or Server)
Windows NT 4 SP6a (Workstation or Server)
Microsoft SQL Server (Optional)
Agent Workstation Hardware Requirements
Processor and Memory as specified by minimum Operating System requirements.
At least 5 MB of available disk space.
Agent Workstation Operating System Compatibility
Citrix Server, Microsoft Terminal Server
Windows XP, 2000 SP4, NT 4.0 SP6a
Windows ME, 98, 98SE
Windows 95 with Microsoft’s Winsock2 (included)
Additional System Requirements
If you would like to evaluate Echo Filters™, Website•Echo’s web category filtering and reporting feature, please ensure that the Microsoft .Net Framework is installed on your Website•Echo Server. You can obtain the latest .Net Framework from Microsoft or directly from the “Custom” option of your Windows Update utility.
Note: Installing and running server software on Windows Vista should be done with elevated privileges or with User Account Control disabled.