Security of Corporate Identities
It allows you to centrally record the operations taking place on critical servers or workstations. It helps you to control the operations of the companies that provide remote support or the “outsourced” personnel working in the company / institution.
SAVE THE IMAGE, YOU DON'T HAVE TO DEAL WITH LOG FILES
HELPS YOU COMPLY WITH ISO 27001 AND SIMILAR SAFETY STANDARDS
GIVES YOU A WARNING WHEN KEYWORDS ARE PASSED
Benefits and Features
Auditing critical servers and workstations
It is extremely important to monitor the operations performed in systems with critical data in terms of security and business continuity. It becomes possible to monitor what system administrators (local/RDP) and company personnel who provide remote support (RDP) are doing on the relevant systems. User-Based Registration Mode
You can monitor the sessions of certain users. In this way, you can record the employees of companies that provide remote support, regardless of which system they connect to.
It can automatically generate alerts when certain keywords occur within sessions. Thanks to this feature, you can automatically track words such as @hotmail.com, @gmail.com, bomb, "competitor".
Word Search, Fast Play and Video Export
It allows you to search for words within sessions. For example, when it comes to a research, you can determine in seconds which sessions have passed the "prime minister".
You don't have to spend eight hours watching an eight-hour session. With advanced playback options, you can play sessions fast or watch only the moments of activity. In addition, you can export a session that you find important as a video in different formats.
Establishing Institutional Memory
It can also be used to record what kind of actions are taken during the response to incidents. In this way, you can create a kind of video training library.