One day last summer I was in a bank branch, standing in line waiting to conduct my business. Bored, I studied my surroundings and took note of a security camera directed toward the teller station ahead of me. No doubt it was capturing video of each person that approached the teller window and especially of the teller herself who was dispensing cash as customers made withdrawals.
Just two days later, that bank branch was robbed at gunpoint. The evening news had a fairly clear picture of the robber standing in about the same spot I was standing. I guess he didn’t notice (or didn’t care about) the camera that caught the image of him that was flashed on the news and used in a Crime Stoppers press release. A week later I read in the newspaper that the robber had been identified by his photo, apprehended at home and charged with bank robbery.
What if you could put that level of video surveillance to work for you to protect your network? It’s not that you suspect your work colleagues are perpetrating cyber crimes or corporate espionage, but perhaps you need to keep a detailed log of what privileged users are doing on your systems. At the very least, you probably operate under regulatory mandates that dictate the need to audit who is doing what with sensitive data on your network.
READ MORE …