Archive for the Category ◊ ObserveIT ◊

ObserveIT Selected as IBM Beacon Award Finalist
Thursday, February 13th, 2014 | Author:

ObserveIT, the leading provider of user activity recording and auditing software, announced today it has been selected as one of two IBM Beacon Award finalists in the “outstanding ready for IBM security intelligence solution” category.

The IBM Beacon Awards recognize IBM Business Partners who have delivered exceptional solutions using IBM products and services. By delivering innovative solutions proven to drive business value, Beacon Award winners help transform the way their clients, their industries and the world do business.

ObserveIT, the leading provider of user activity recording and auditing software, announced today it has been selected as one of two IBM Beacon Award finalists in the “outstanding ready for IBM security intelligence solution” category.

The IBM Beacon Awards recognize IBM Business Partners who have delivered exceptional solutions using IBM products and services. By delivering innovative solutions proven to drive business value, Beacon Award winners help transform the way their clients, their industries and the world do business.

ObserveIT’s behavior monitoring software solution is already in use in more than 800 corporations in 70 countries, where it is used for auditing, tracking and recording thirdparty and internal privileged user behavior with real-time, context-aware video monitoring within any server environment. ObserveIT augments the traditional access management and logging systems by adding video playback of user activities, helping IT management clearly and easily understand who did what and when.
Read more at http://www.broadwayworld.com/bwwgeeks/article/ObserveIT-Selected-as-IBM-Beacon-Award-Finalist-20140212#JJzjKvYbSg9bSRUD.99

Category: ObserveIT  | Leave a Comment

Gizmodo reported a few days ago that the hackers who managed to swipe the credit and debit card information of up to 40 million Target customers gained access to Target’s network through a single login account – that of HVAC sub-contractor, Fazio Mechanical Services. The article explains that Fazio is a “third-party vendor” with legitimate remote access to the retail giant’s network. Somehow, the hackers obtained Fazio’s access credentials and from there went on to perpetrate one of the greatest corporate data breaches in history.

READ MORE …

Category: ObserveIT  | Leave a Comment
ObserveIT for Citrix — Going Strong
Friday, January 10th, 2014 | Author:

Citrix Replacement Update

Since Citrix stopped offering SmartAuditor and tagged ObserveIT as the replacement, we’ve been gaining a huge amount of attention.  In fact, we’ll even be at Citrix Summit next week in Orlando, Florida to show off our solution.  If you’ll be there, stop by our booth #412 or contact us to set up an in-person demo.

You can also watch this quick demonstration of how ObserveIT’s session recording system can be used to record and playback all user activity in Citrix XenApp published applications and on XenDesktop virtual desktops – with technology that officially replaces SmartAuditor.

 

 

 

READ MORE …

Category: ObserveIT  | Leave a Comment
Monitor Privileged Activity on UNIX and Linux
Friday, December 27th, 2013 | Author:

Organizations using UNIX and Linux no longer have to remain in the dark, fully trusting every action that privileged users, including third party contractors, make once they gain access to the network.  The ObserveIT UNIX Auditor monitors and records all privileged activity from the moment the user logs in until the end of the session.

READ MORE …

Category: ObserveIT  | Leave a Comment
ObserveIT Raises $20M from Bain Capital Ventures
Wednesday, December 11th, 2013 | Author:

ObserveIT, a New York-based provider of user activity recording and auditing software, raised $20m from Bain Capital Ventures.

The company intends to use the funds to expand U.S. headquarters and overall product development, sales and marketing.

Founded in 2006 and led by Gabriel Friedlander, CTO, ObserveIT provides a complete visual log via a software-only solution and provides the most comprehensive monitoring and insight into user activity that enables its customers to solve compliance, security and IT operational problems.
The solution is used at more than 800 corporations including GE Money, ING, Toshiba, Xerox, Coca-Cola, Samsung, T-Mobile, Vodafone, UPS, Fujitsu and Cisco in 70+ countries.

 

READ MORE …

Category: ObserveIT  | Leave a Comment

As you may have heard in the news recently, a hacker has recently stolen the names, addresses, and bank account numbers among other personal data of about 2 million Vodafone customers, primarily from Germany.

According to the German police, they suspect that this attack appears to be done with intent by someone who was working as a sub-contractor for Vodafone’s administration system, and, therefore, had access to the IT infrastructure.

It’s a fact of life! Third-party vendors require access your corporate network, but this shouldn’t come at the expense of your intellectual property or sensitive data security!

 

 

 

READ MORE …

Category: ObserveIT  | Leave a Comment

According to a recent survey of 100 federal government cyber-security workers conducted by MeriTalk, end users are reluctant to follow IT security policies because they view them as obstacles to be circumvented.  In fact, end users indicated that they are frustrated that the number of “stubborn protocols” are burdensome, time consuming and obstructive.  As a result, 31% of them use some kind of security work-around at least once a week.

But what these end-users may not be aware of is that following the various compliance policies established by the cyber pros is necessary to prevent serious data breaches. In fact, according to the Verizon 2013 DBIR, the more compliant an organization is, the stronger its IT security. In other words, they are at less risk of a damaging data breach.

 

 

 

READ MORE …

Category: ObserveIT  | Leave a Comment
Why Select “Video Surveillance” for your IT Systems?
Sunday, November 10th, 2013 | Author:

One day last summer I was in a bank branch, standing in line waiting to conduct my business. Bored, I studied my surroundings and took note of a security camera directed toward the teller station ahead of me. No doubt it was capturing video of each person that approached the teller window and especially of the teller herself who was dispensing cash as customers made withdrawals.

Just two days later, that bank branch was robbed at gunpoint. The evening news had a fairly clear picture of the robber standing in about the same spot I was standing. I guess he didn’t notice (or didn’t care about) the camera that caught the image of him that was flashed on the news and used in a Crime Stoppers press release. A week later I read in the newspaper that the robber had been identified by his photo, apprehended at home and charged with bank robbery.

What if you could put that level of video surveillance to work for you to protect your network? It’s not that you suspect your work colleagues are perpetrating cyber crimes or corporate espionage, but perhaps you need to keep a detailed log of what privileged users are doing on your systems. At the very least, you probably operate under regulatory mandates that dictate the need to audit who is doing what with sensitive data on your network.

 

 

 

READ MORE …

Category: ObserveIT  | Leave a Comment

ObserveIT, a provider of user activity recording and auditing technology, announced the introduction of ObserveIT 5.6.8.

In a release, the Company said that the behavior monitoring software solution is already in use in more than 800 corporations in 70+ countries, where it is used for auditing, tracking and recording 3rd-party and internal privileged user behavior with real-time, context-aware video monitoring within any server environment.

ObserveIT augments the traditional access management and logging systems, by adding video playback of user activities, helping IT management understand who did what and when.

READ MORE …

Category: ObserveIT  | Leave a Comment

Network World – Any detective will tell you how helpful it is to have clear and undisputed video evidence of a crime. Imagine that a perpetrator comes onto your property, looks straight into the surveillance camera to give you a clear shot of his face, and proceeds to do his dirty work with every action he performs caught on video. Once the person is caught and goes on trial for his crime, his attorney will find it hard to refute the evidence because it’s all there for the jury to see.

What if you could have that kind of evidence for your IT systems? Rather than a video of the person’s face and his physical actions, you are collecting clear video evidence of a person’s interactions with the computer—what applications he accesses, what he types, what options he selects, which buttons he presses, and so on. This video can be saved and played back later as needed, just as the detective can play the video of our crime scene above. And not only do you get a video, but also an English text transcript of all of the actions.

 

 

 

READ MORE …

Category: ObserveIT  | Leave a Comment