5 Reasons To Augment Video Surveillance With User Activity Monitoring
By Gaby Friedlander, Co-founder and CTO, ObserveIT
In the last decade, companies have invested heavily in video surveillance solutions as a way to prevent unauthorized personnel from entering secure areas. While this approach has proven effective in the physical realm, it has done almost nothing to secure private property in the digital realm. Indeed, when the most valuable property of all isn’t the server room, but rather the server’s data, companies must find a way to augment their physical surveillance … before it’s too late.
Previously, IT security teams simply tried to construct a picture of what people were doing on the network from any available systems log (firewalls, SBCs, databases, etc.). The process was extremely tedious and fraught with blind spots, as users moved from one system to another. A new approach has emerged, one that is centered on individual users — rather than networking equipment — and which offers a way to create video-like replays from aggregated screen captures, showing exactly which applications users accessed, which commands they executed, what characters they typed, which files they downloaded, and more.
Please log in or register below to read the full article.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.