Www.kriptonsolutions.com. Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

AB Tutor Control PC Remote Access Software. - Key Features
BalaBit Shell Control Box
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
USER ACTIVITY MONITORING: YOUR MISSING SECURITY VANTAGE POINT Presented by Matt Zanderigo.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
NETOP REMOTE CONTROL What’s new in version 9.5? DECEMBER 09 NETOP REMOTE CONTROL1.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Securing the Borderless Network March 21, 2000 Ted Barlow.
Remote Access Network Management Kelly Given Allison Traina.
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
11 ADMINISTERING MICROSOFT WINDOWS SERVER 2003 Chapter 2.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Maintaining and Updating Windows Server 2008
Windows Network Policy Server Fundamentals Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India
Change Auditing Software
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
OnBase Module Deployment
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Chapter 7: Using Windows Servers to Share Information.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Conditions and Terms of Use
CSI-E Computer Security Investigator – Enterprise.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Module 7: Fundamentals of Administering Windows Server 2008.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
DSView 4 Management Software
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Windows 2008 Configuring Server Roles and Services.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Room 110, 1/F, Tech Centre, 72 Tat Chee Avenue, Kowloon Tong, Hong Kong Tel: (852) Fax: (852)
Remote Administration Remote Desktop Remote Desktop Gateway Remote Assistance Windows Remote Management Service Remote Server Administration Tools.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Module 1: Introduction to Administering Accounts and Resources.
Integrated Mobile Marketing Platform Emergic mConnector Integrated -Mobile Marketing Platform Presented By: Sales Person Name ID: Mobile:
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.
Maintaining and Updating Windows Server 2008 Lesson 8.
Chapter 7: Using Windows Servers
Module 1: Introduction to Administering Accounts and Resources
Services Provided by Network Operating Systems
Presentation transcript:

Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A

Current Situation Internal Users Auditors System Administrators Independent Contractor Vendors Shared Applications IT Infrastructure CRM System Corporate Database Shared Data Access Trusted Users

Current Problems !!! Data Base Server Server File Server Domain Server Proxy Server FTP server Web server Communication Server Print server Chat Server Terminal services Citrix Remote Desktop PC-Anywhere VMware VNC VDI NetOP Dameware ServersRemote Access medium Problems Who accessed When they accessed How they accessed What changes are done No visibilities on what changes/violations are done Data Leakage Financial loss Loss of reputation Law sue form customers Competitor will take advantages

Record & Replay user sessions – Like a “CCTV” sitting on your system – Pure software based solution – Fast & Lightweight, extremely small footprint on client machine Why Ekran System

Compliance & Security – Track all access to servers & databases – Audit what your people are doing on corporate systems – Unquestionable evidence – Precise identification of the user Remote Vendor Monitoring – Track what your outsourced vendors are doing on your servers – Improve security & accountability – Transparent and complete audit of all activity Root Cause Analysis – Know “who did what” – Ability to setup alerts for immediate identification of unauthorized activities Why Ekran System

Architecture - Unlimited terminal sessions recording - Record any session RDP, LogMeIn - Internal User Authentication - Windows Integrated Authentication - Customizable user permissions - Remote installation/uninstallation of Clients - Management via Web console - Real-time alerts - Policy based Recording - Reports including Scheduling Key Features

Other Key features !! Capture Screen Periodically Capture Screen on Active window Capture Screen on key press or mouse move Enable keystrokes logging Bit Depth Supported Codec Avi Mp4 Intel IYUV Codec Microsoft RLE Microsoft Video 1 24 bits recording 8 bits recording 4 bits recording Recording Options Alert Messages AD Integrations Remote Installation / uninstallation Encrypted communication Reports Standard Report Custom Report Excel Delivery Some of key features

Video replay of user session A user accessing a file on a particular machine

Ekran System – Server Side All user activity captured on the server side

Reports Key Features Scheduled report options

Activity Summary Report

URL Summary Report

Activity Chart Report

Activity Pie Chart Report

URL Chart Report

Our Customers

Thank you Q & A …..????