Key Features of User Activity Monitoring (UAM)
UAM uses on-screen recording expertise that captures individual user activities. Each video-like playback is saved and attached to the related user activity log. Playbacks differ from traditional video playback to screen scraping, which is the compiling of sequential screen computer shots into a video-like replay. The user activity logs along with the video-like playback delivers a searchable summary of all user actions. This enables companies to not only read, but also view exactly what a particular user did on company systems.
Video Activity Analysis
The videos recorded by UAM can be lengthy and dull to watch. Advanced User Activity Monitoring software can analyze such vides to automatically find trouble spots and even automatically trigger alerts and detailed logs under such scenarios.
User Activity Logs
UAM solutions transcribe all documented activities into user activity log data. UAM logs match up with video-playbacks of parallel actions. Some examples of items logged are names of applications opened, titles of pages viewed, URLs visited, text (typed, edited, copied/pasted), commands and scripts executed.
Compliance Report Automation
Achieve perfect compliance by tracking every access to corporate servers and databases, with detailed usage reporting and total application coverage.
Zero Gap Recording
UAM software records & analyzes user activity in every application, Web page and system area, over any connection protocol (RDP, SSH, Telnet, ICA, direct console login, etc.). UAM even records sessions in Citrix published applications, Citrix virtual desktops and VMware environments, as well as stand-alone Windows, Unix, Linux desktops and servers.
Third Party Vendor or Contractor Monitoring
Learn exactly what third party vendors or contractors are doing on your company’s networks and servers. Improve security and ensure transparent operations.
Privileged User Monitoring
Monitor privileged users having high profile access to sensitive corporate data and other critical information.
Enhance information and data security across the corporate network with having the privilege to know who did what and when on your networks.