Upload
susane
View
37
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Capture Save and Playback User Session Screens. Part 1 Capture Scenario. Do Any of Your Employees Look …. Bored?. Sulky?. Furious?. One of Them Could Easily Change Financial Records and “Pocket the Difference”…. According to FBI research, 85% of security breaches are - PowerPoint PPT Presentation
Citation preview
Hacking
www.razlee.com
CaptureSave and Playback User Session Screens
Hacking
www.razlee.com
Part 1 Capture Scenario
Do Any of Your Employees Look …
Bored? Sulky? Furious?
One of Them Could Easily Change Financial Records and “Pocket the Difference”…
No one is watching… They’ll never notice!
According to FBI research, 85% of security breaches are performed by employees.
The Employee Changes Financial Records…
Capture to the Rescue: Immediately Records User Screens in Rapid Succession
Security Staff Easily Finds Proof of Offender Identity
Log of Captured User SessionsSearch for Suspicious Item within LogLocating Offender Identity and Proof of Breach
Part 2 Capture Information
Capture Features
Silently copies and documents user (green) screens
Activated by user-selectable criteria
Collects and documents CL (Command Logs)
Useful for monitoring & technical support
Real-time screen capture and storage including playback, with no performance degradation
Integrated with several iSecurity modules (i.e. can display Audit log text as a part of captured screens)
Complete solution for industry tracking regulations(banking, insurance), including query documentation
Option for notifying users that their session is being recorded
Sample Applications
• Financial Institutions• Provides critical audit trail for transaction-intensive financial
institutions, such as banks, investment brokers and insurance companies
• Healthcare• Designed to meet new data auditing, retention and security
regulations in the US and Europe• Help Desk• Ideal solution for technical support - staff can scroll through user
screens to determine which actions caused elusive error conditions• Valuable tool for program debugging and troubleshooting user errors
Multiple Triggers for Capture Initiation
• Firewall• Network Intrusions
• Audit• Unauthorized user actions
• Help Desk• Crossing of thresholds in business-critical applications
Please visit us at www.razlee.com
Thank You !