1 / 12

Capture Save and Playback User Session Screens

Capture Save and Playback User Session Screens. Part 1 Capture Scenario. Do Any of Your Employees Look …. Bored?. Sulky?. Furious?. One of Them Could Easily Change Financial Records and “Pocket the Difference”…. According to FBI research, 85% of security breaches are

susane
Download Presentation

Capture Save and Playback User Session Screens

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CaptureSave and Playback User Session Screens

  2. Part 1 Capture Scenario

  3. Do Any of Your Employees Look … Bored? Sulky? Furious?

  4. One of Them Could Easily Change Financial Records and “Pocket the Difference”… According to FBI research, 85% of security breaches are performed by employees. No one is watching… They’ll never notice!

  5. The Employee Changes Financial Records…

  6. Capture to the Rescue: Immediately Records User Screens in Rapid Succession

  7. Security Staff Easily Finds Proof of Offender Identity Locating Offender Identity and Proof of Breach Log of Captured User Sessions Search for Suspicious Item within Log

  8. Part 2 Capture Information

  9. Capture Features Silently copies and documents user (green) screens Activated by user-selectable criteria Collects and documents CL (Command Logs) Useful for monitoring & technical support Real-time screen capture and storage including playback, with no performance degradation Integrated with several iSecurity modules (i.e. can display Audit log text as a part of captured screens) Complete solution for industry tracking regulations(banking, insurance), including query documentation Option for notifying users that their session is being recorded

  10. Sample Applications • Financial Institutions • Provides critical audit trail for transaction-intensive financial institutions, such as banks, investment brokers and insurance companies • Healthcare • Designed to meet new data auditing, retention and security regulations in the US and Europe • Help Desk • Ideal solution for technical support - staff can scroll through user screens to determine which actions caused elusive error conditions • Valuable tool for program debugging and troubleshooting user errors

  11. Multiple Triggers for Capture Initiation • Firewall • Network Intrusions • Audit • Unauthorized user actions • Help Desk • Crossing of thresholds in business-critical applications

  12. Thank You! Please visit us at www.razlee.com

More Related