ObserveIT Brochure - Like a Security Camera on your Servers

4
ObserveIT User Acvity Session Recording soſtware meets the complex compliance and security challenges of user auding. ObserveIT acts like a security camera on your servers, generang video recording and text audit logs of every acon the user performs. ObserveIT captures all acvity, even for applicaons that do not produce their own internal logs. Every acon performed by remote vendors, developers, sysadmins and business users is ed to a video recording, providing bulletproof forensic evidence. ObserveIT is the ideal soluon for 3rd Party Vendor Monitoring and PCI/HIPAA/SOX/ISO Compliance Accountability, with a simple and direct soluon fo PCI Requirements #8, #10 and #12. people audit PCI Compliance Highlights PCI Req. 8 and Req. 10.1 – ObserveIT es exact user names (’John’) to shared-account access (’Administrator’) without the need for complex password vaults. PCI Req. 10.2 and Req. 10.3 -ObserveIT gives true clarity for every user acon. No more wondering who or what caused a system change. PCI 12 – ObserveIT ensures that users are informed of corporate policies at the exact me they log in. Business Soluons Remote Vendor Monitoring - Know exactly what every remote user is doing on your servers. Improve security and ensure transparent SLA and billing validaon. Reducing Compliance Costs - Staying compliant is oſten just as costly as geng compliant. ObserveIT provides easy gap management, including coverage of PCI Requirements 8, 10, 12, by eliminang the need to rebuild audit protocols whenever you upgrade business soſtware processes. Root Cause Analysis - Achieve fast troubleshoong when you discover the root cause of system config changes. Establish business intelligence with focused navigaon and video playback. Key Features Record & Replay User Sessions - Know exactly what users did, with auto-generated video and text logs for every app Video Content Analysis - ObserveIT gives full transparency, even when apps have no internal logs built in. For each user session, we tell you which apps, commands, files, URLs or system calls were run within that session, including for cloud legacy apps that are notoriously difficult to audit. Privileged User Idenficaon - Tie a specific name to every shared-account user sessions. No more wondering “Who ran that ‘Administrator’ session?”, with a simple approach that does not require password rotaon or checkin/checkout. Server + Desktops + VDI Monitoring - Full audit coverage for all user acvity on servers, desktops or published applicaons. Bulletproof legal evidence - Reduce the risk of misaligned client-vendor interests by capturing bulletproof legal evidence of all vendor acvity. Video replay can be used during ligaon or to eliminate the need for legal acon.

description

ObserveIT acts like a security camera on your servers, generating video recording and text audit logs of every action the user performs. ObserveIT captures all activity, even for applications that do not produce their own internal logs. Every action performed by remote vendors, developers, sysadmins and business users is tied to a video recording, providing bulletproof forensic evidence. ObserveIT is the deal solution for 3rd Party VendorMonitoring and PCI/HIPAA/SOX/ISO Compliance Accountability, with a simple and direct solution for PCI Requirements #8, #10 and #12.

Transcript of ObserveIT Brochure - Like a Security Camera on your Servers

Page 1: ObserveIT Brochure - Like a Security Camera on your Servers

ObserveIT User Activity Session Recording software meets the complex compliance and security challenges of user auditing.

ObserveIT acts like a security camera on your servers, generating video recording and text audit logs of every action the user performs. ObserveIT captures all activity, even for applications that do not produce their own internal logs. Every action performed by remote vendors,developers, sysadmins and business users is tied to a video recording, providing bulletproof forensic evidence.

ObserveIT is the ideal solution for 3rd Party Vendor Monitoring and PCI/HIPAA/SOX/ISO Compliance Accountability, with a simple and direct solution fo PCI Requirements #8, #10 and #12.

people audit

PCI Compliance Highlights• PCI Req. 8 and Req. 10.1 – ObserveIT ties exact user names (’John’) to shared-account access (’Administrator’) without the need for complex password vaults.

• PCI Req. 10.2 and Req. 10.3 -ObserveIT gives true clarity for every user action. No more wondering who or what caused a system change.

• PCI 12 – ObserveIT ensures that users are informed of corporate policies at the exact time they log in.

Business SolutionsRemote Vendor Monitoring - Know exactly what every remote user is doing on your servers. Improve security and ensure transparent SLA and billing validation.

Reducing Compliance Costs - Staying compliant is often just as costly as getting compliant. ObserveIT provides easy gap management, including coverage of PCI Requirements 8, 10, 12, by eliminating the need to rebuild audit protocols whenever you upgrade business software processes.

Root Cause Analysis - Achieve fast troubleshooting when you discover the root cause of system config changes. Establish business intelligence with focused navigation and video playback.

Key FeaturesRecord & Replay User Sessions - Know exactly what users did, with auto-generated video and text logs for every app

Video Content Analysis - ObserveIT gives full transparency, even when apps have no internal logs built in. For each user session, we tell you which apps, commands, files, URLs or system calls were run within that session, including for cloud legacy apps that are notoriously difficult to audit.

Privileged User Identification - Tie a specific name to everyshared-account user sessions. No more wondering “Who ran that‘Administrator’ session?”, with a simple approach that does not require password rotation or checkin/checkout.

Server + Desktops + VDI Monitoring - Full audit coverage for all user activity on servers, desktops or published applications.

Bulletproof legal evidence - Reduce the risk of misaligned client-vendor interests by capturing bulletproof legal evidence of all vendor activity. Video replay can be used during litigation or to eliminate the need for legal action.

Page 2: ObserveIT Brochure - Like a Security Camera on your Servers

ObserveIT: Video replay that showsexactly what the user did

ObserveIT can...Because a picture is worth a thousand logs!

Page 3: ObserveIT Brochure - Like a Security Camera on your Servers

ObserveIT Eliminates Blindspots:Video and log summaries of every user action

Exact video playback

Within each session, details of every

action taken

For each command, a detailed list of system calls

Exact video playback of TTY command prompt screen

List of each user command

ObserveIT lists everyuser session

Unix/Linux Session: Video + AnalysisObserveIT captures shell and console logins, including all command line activity plus underlying system calls. (ex: If user types “rm*”, ObserveIT also captures each file name that is deleted.)

Windows Session:Video + AnalysisObserveIT captures window title, application name, files opened, URL accessed, UI element selection and text entry

Page 4: ObserveIT Brochure - Like a Security Camera on your Servers

ObserveIT Feature List

Who’s Using ObserveIT

Like a Security Camera on Your Servers.people audit1 (800) 687-0137 [email protected] www.observeit.com

Generate Logs for Apps that have no logs - Detailed log for all apps, even those that have no internal logs, including Cloud apps (ex: salesforce.com), legacy apps (ex: customized ERP) and commercial software (ex: Excel, SQL query tools).

Record and Replay Windows, Unix and Linux Sessions - Exact video playback of every session, including mouse movements, UI interaction, TTY command line interaction, text entry and underlying system calls. Simple playback and navigation of recordings.

Video Content Analysis gives intelligent text logs - Captures details about each user action: Application name, User name, Server, Window title, File or Resource accessed, underlying system calls. Interactive drilldown and fast navigation eliminates the need to reply hours of video to find what you need.

Complete Coverage - Agnostic to network protocol and client application. Captures all remote and console sessions: SSH, Telnet, Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC, Dameware and more.

Privileged User Identification - Add additional level of system access control for sensitive resources. Require shared-id users (ex: administrator) to add secondary login credentials. Manage users locally or tie in to AD.

Real-time Playback - Session recordings are immediately availableonce session begins. View session activity "on the air", while users are still active.

Canned Audit Reports - Use our pre-built audit reports, or create your own custom reports. Schedule reports to run automatically for email delivery, or run ad-hoc and export to Excel or XML.

Robust Security - Agent-Server encryption, Digital Signatures and Watchdog mechanism ensure the highest security and reliability.

Small Footprint - Ultra-efficient data storage: Less than 250GB/year for high-usage, 1000 server environment. Minimal Agent CPU utilization: 0% CPU when no console active, 1%-2% CPU, 10 MB RAM during session).

With so many privileged vendors accessing our servers, it can be difficult to keep an eye on who's doing what.

Pelephone

ObserveIT is critical for answering management's needs to demonstrate compliance.

Center to Promote Health Care Access