ObserveIT Enterprise for User Activity Monitoring:

Get Compliant with Citrix, SSH and RDP Recording

What ObserveIT Does

Right Captures video recording of all user activity

Right Generates textual audit logs for every app (even apps that have no internal logging!)

Right Generates real-time alerts on sensitive, abnormal, suspicious or malicious user activity

Right Identifies shared-account users (‘admin’) and detects identity theft

ObserveIT Overview Video

ObserveIT’s Corporate Keylogger

Key Features

  • Intelligent audit logs: Video logs and Textual metadata logs for every user action, including legacy apps, cloud and commercial software, and apps with no internal logging
  • Record & Replay: Precise forensic investigation that shows visually exactly what the user did
  • Real-time alerts: Customizable real-time user activity alerts provide proactive warnings to security personnel
  • Identity Management Suite: Tie generic ‘administrator’ logins to specific named user and detect identity theft
  • SIEM Integration: Simple tie-in of intelligent log data for any SIEM, Log Management and System Monitor platform
  • Policy messaging: Satisfies policy training compliance regulations

How it Works

  • ObserveIT identifies any new server session, and associates the session with a specific user
  • During the session, all user actions on screen are recorded for video replay
  • Detailed textual metadata logs list every app, resource or CLI command that the user ran
  • Canned compliance reports show all actions, with links to video replay for further clarification

Comprehensive Activity Coverage

  • All apps: Logs captured for every application (even those with no logs!)
  • All users: Named business users and shared-account privileged (‘admin’, ‘root’) users
  • All protocols and environments: SSH, RDP, Citrix, VMware, etc.
  • All sessions: Windows/Unix/Linux – servers/desktops – remote/local

Enterprise Scale Architecture

ObserveIT is built from the ground-up to meet the most demanding enterprise requirements. ObserveIT audits all protocols, without requiring architecture changes on your network.

  • Robust Security
  • Event-driven policy rules
  • Small Footprint

See exactly what users are doing:

  • Edit System Files
  • Change OS Settings
  • Run an SQL query
  • Download File from the Internet
  • Send Files to FTP Serve
  • Change source code in Visual Studio
  • Send Email
  • Open or Edit Excel spreadsheets
  • Access shared folders
  • Login to application
  • Delete file
  • Start SAP transaction
  • View Customer Detail page in CRM or ERP
  • Access specific URL
  • and more…

Compliance Accountability

  • Satisfy PCI, HIPAA, SOX and ISO regulatory mandates
  • Generate logs for every application
  • Precise user identification
  • Policy training and validation

Remote Vendor Monitoring

  • Know exactly what 3rd party vendors are doing
  • Improve security, accountability and policy messaging
  • Transparent SLA and billing validation
  • Real-time alerts on sensitive or suspicious user actions

Root-Cause Analysis

  • Know ‘Who did what?’:  Answer the question that will really lead to problem resolution
  • Immediate root cause determination
  • Defeat the ‘oops’ factor
  • Preempt failures with real-time user activity alerts

Managed Services Monitoring

  • For VARs, MSPs and remote IT support teams
  • Monitor your employee activity on customer servers
  • Improve trust and quantify SLA measurements
  • Speed up the troubleshooting process

Business Solutions:
Audit solutions that record RDP and all remote access

Privileged Session Manager

  • Control, protect, monitor, record and audit every privileged account session
  • Zero-gap recording of Windows and Unix/Linux sessions over any remote connection protocol plus local console
  • Keyword-searchable activity logs and textual session summaries
  • Real-time session activity monitoring with remote session lock
  • Custom alerts based on definable activity triggers

Network Device Configuration Change Monitoring

  • Easy-to-understand visual monitoring and auditing solution for network device configuration changes
  • Easily discover every change made to device configurations, who made them and when
  • Full video recording and playback of every device configuration change
  • Keyword-searchable activity logs and custom alerts based on user-definable triggers

Who Benefits from ObserveIT?

  • Compliance officers can incorporate ObserveIT in their reporting process
  • IT managers can streamline troubleshooting
  • ISVs can integrate ObserveIT into their software products, to add screen recording functionality
  • Managed services providers can embed ObserveIT into their IT service offerings, to strengthen reliability and SLA

Our Customers

Leading corporations and institutions around the world are using ObserveIT to secure and monitor their IT server environments..