Do Any of Your Employees Look … Bored?Sulky?Furious?
One of Them Could Easily Change Financial Records and “Pocket the Difference”… No one is watching… They’ll never notice! According to FBI research, 85% of security breaches are performed by employees.
Capture Features Silently copies and documents user (green) screens Activated by user-selectable criteria Collects and documents CL (Command Logs) Useful for monitoring & technical support Real-time screen capture and storage including playback, with no performance degradation Integrated with several iSecurity modules (i.e. can display Audit log text as a part of captured screens) Complete solution for industry tracking regulations (banking, insurance), including query documentation Option for notifying users that their session is being recorded
Sample Applications Financial Institutions Provides critical audit trail for transaction-intensive financial institutions, such as banks, investment brokers and insurance companies Healthcare Designed to meet new data auditing, retention and security regulations in the US and Europe Help Desk Ideal solution for technical support - staff can scroll through user screens to determine which actions caused elusive error conditions Valuable tool for program debugging and troubleshooting user errors
Multiple Triggers for Capture Initiation Firewall Network Intrusions Audit Unauthorized user actions Help Desk Crossing of thresholds in business-critical applications