Calendrier des Webinaires
Prochains Webinaires en direct
The next generation of corporate keylogging: Going WAY beyond the keyboard
Corporate key loggers track and record an employee's or vendor's computer activity for the purposes of monitoring, root cause analysis, forensic investigation and regulatory auditing. In this session, you'll learn how ObserveIT takes key logging into the next generation with some unique capabilities.
What is ObserveIT: A brief explanation of User Activity Monitoring Software
Join me as I give a short explanation of what ObserveIT is, and how its unique approach to User Activity Monitoring is truly the ideal solution for monitoring remote and 3rd Party Vendor Monitoring; and for addressing your accountability, best-practice security and compliance (PCI/HIPAA/SOX/ISO) needs.
Enregistrements des webinaires précédents
Make your SIEM sing with User Activity Logs
In this session, you'll learn exactly how to show precise user activity directly from within your Splunk, ArcSight, RSA enVision and CA UARM platform. Native dashboards can now show exactly what applications, files and URLs each user has accessed, including video replay that shows exactly what the user did on-screen.
Como generar registros de auditoria (Logs) para aplicaciones que no poseen esa capacidad por si mismas?
En esta sesión de 30 minutos, usted aprenderá:
- Como hacer para mejorar la calidad de sus registros de auditoria (Logs), agregando a estos registros, la actividad del usuario a los además de lo registrado por el sistema o bases de datos
- Que tipo de acciones que realizan los usuarios no aparecen en los registros de auditoria (Logs) hoy en día
- Donde es que los auditores buscan agujeros de seguridad a la hora de realizar sus evaluaciones
Special Webinar Series - Security Auditing Options for Linux and Solaris
You don't know what you don't know:
Why log analysis is failing today and what you can do to overcome it
Less than 1% of data breaches discovered via security logs. In this webinar we explore the reasons behind this statistic and how to overcome this reality with video recording of all user activity.
How to Generate Logs for Apps that Don't Produce Logs
Learn how to augment system and database logs with user activity logs. See the types of user actions that aren’t in your logs today and where compliance auditors usually find holes in audit reports.
How to Audit Remote and 3rd Party Users
In this webinar, we highlight the security and compliance issues related to remote users, and follow that up with an overview of how to deploy a robust and secure platform to mitigate the risks.
Full ObserveIT Product Review
In this webinar, our senior architect provides a detailed overview of the full ObserveIT platform, including a full feature demonstration and an architecture overview.