capture save and playback user session screens
DESCRIPTION
Capture Save and Playback User Session Screens. Part 1 Capture Scenario. Do Any of Your Employees Look …. Bored?. Sulky?. Furious?. One of Them Could Easily Change Financial Records and “Pocket the Difference”…. According to FBI research, 85% of security breaches are - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/1.jpg)
Hacking
www.razlee.com
CaptureSave and Playback User Session Screens
![Page 2: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/2.jpg)
Hacking
www.razlee.com
Part 1 Capture Scenario
![Page 3: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/3.jpg)
Do Any of Your Employees Look …
Bored? Sulky? Furious?
![Page 4: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/4.jpg)
One of Them Could Easily Change Financial Records and “Pocket the Difference”…
No one is watching… They’ll never notice!
According to FBI research, 85% of security breaches are performed by employees.
![Page 5: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/5.jpg)
The Employee Changes Financial Records…
![Page 6: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/6.jpg)
Capture to the Rescue: Immediately Records User Screens in Rapid Succession
![Page 7: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/7.jpg)
Security Staff Easily Finds Proof of Offender Identity
Log of Captured User SessionsSearch for Suspicious Item within LogLocating Offender Identity and Proof of Breach
![Page 8: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/8.jpg)
Part 2 Capture Information
![Page 9: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/9.jpg)
Capture Features
Silently copies and documents user (green) screens
Activated by user-selectable criteria
Collects and documents CL (Command Logs)
Useful for monitoring & technical support
Real-time screen capture and storage including playback, with no performance degradation
Integrated with several iSecurity modules (i.e. can display Audit log text as a part of captured screens)
Complete solution for industry tracking regulations(banking, insurance), including query documentation
Option for notifying users that their session is being recorded
![Page 10: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/10.jpg)
Sample Applications
• Financial Institutions• Provides critical audit trail for transaction-intensive financial
institutions, such as banks, investment brokers and insurance companies
• Healthcare• Designed to meet new data auditing, retention and security
regulations in the US and Europe• Help Desk• Ideal solution for technical support - staff can scroll through user
screens to determine which actions caused elusive error conditions• Valuable tool for program debugging and troubleshooting user errors
![Page 11: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/11.jpg)
Multiple Triggers for Capture Initiation
• Firewall• Network Intrusions
• Audit• Unauthorized user actions
• Help Desk• Crossing of thresholds in business-critical applications
![Page 12: Capture Save and Playback User Session Screens](https://reader031.vdocuments.site/reader031/viewer/2022013004/56816398550346895dd49163/html5/thumbnails/12.jpg)
Please visit us at www.razlee.com
Thank You !