SlideShare a Scribd company logo
1 of 3
Download to read offline
people audit




 Solutions
                                                 Third Party Monitoring
ObserveIT User Auditing improves server security
and optimizes the outsource support ecosystem
The Need:
The increased use of contractors, offshore support teams and outsourcing
suppliers exposes your corporate network to countless remote users.
You’ve established a VPN and installed RSA tokens. But that is only the first step. You need to audit remote users, to be
able to demonstrate what they are doing on your servers.


       Know who made each configuration change

       Validate SLA commitments and verify billable activity

       Reduce time-to-repair for config-based system outages
In order to perform their assigned tasks, the outsource and 3rd party vendors that support your IT environment must have
access your corporate network. But this access can not come at the expense of your intellectual property or sensitive data
security! User recordings can be searched, navigated and replayed to identify any specific activity. Detailed reporting and
real-time alerting ensures strict compliance with corporate security policies.


ObserveIT gives you full visibility into all 3rd party remote user activity
  With ObserveIT on your network, you can review every action that takes place on your server network. No more
  fingerpointing, no more hunting for cause of changes, and no more wondering what they do on your servers once you
  give them access.
Solutions

                     people audit                                         Third Party Monitoring


ObserveIT Benefits for Third-Party Monitoring
   Improved security - A ‘security camera’ is the best deterrant against known-user security breaches.
   Accountability- Spend less time pointing fingers, and more time improving business.
   SLA validation - When both sides of the vendor-customer relationship can show precise SLA
   response time and billable activity, the level of trust and confidence.

   Policy messaging - Deliver critical information to remote users each time they log on.
   Get back on your feet faster - GFix server outages fast by seeing the root-cause of error,
   not just the symptoms.




‘Video Cameras’ on your servers –Security and deterrance via usage
visibility
 Without user session recording, authorized users can do anything they want on your network once they log on. But
 when remote users know that every action is being recorded, they will be much less likely to be tempted into ‘funny
 business’. Just like a video camera at an ATM machine, it may not physically prevent theft, but it stops 99% of potential
 attacks before they start, by promising swift capture to any policy violators. In addition to the strong deterrent effect of
 user audit recordings, ObserveIT also provides real-time alerts about specific user activity, according to any policy rule
 you wish to track. And with window session playback available directly from within any network security platform
 (ex. SCOM, CA, OpenView), you can rest assured that any improper actions are stopped before they even get started.




No more Fingerpointing: Eliminating doubt regarding who did what
 IT managers need to spend more time improving the company business, and less time playing the blame-game.
 Similarly, outsource vendors want to perform their assignments without concern about what they might be accused of
 doing. With full clarity of every action that took place on your servers, you are no longer left wondering who performed
 each action.
 Imagine a situation where a remote support technician logs on to for a routine maintenance task, performs the task, and
 then logs off. An hour later, you notice that 50,000 records in your customer transaction database were deleted. You
 may find it hard to believe that the support tech would have done it, but the direct timing relationship makes you
 suspicious. How can you be sure what he did while logged on? With ObserveIT, there is no room for doubt. Simply open
 the user diary, see a list of every file, application and resource that the tech used, and if necessary, replay a video of the
 full session.
Solutions

                                                                              Third Party Monitoring
                     people audit


Know immediately if SLA commitments are fulfilled
  Most relationships between customers and outsource vendors are based on trust and experience. Support Level
  Agreements are a cornerstone of this trust, allowing IT managers to know that their needs will be met timely. But
  achieving an accurate measurement of support response time is not always easy task.
  ObserveIT gives you the ability to see exact timing of vendor activity, thus verifying the SLA commitments. Vendors enjoy
  the fact that doubt and subjective measurements are eliminated, with solid, objective timing providing proof of the high
  service quality being supplied.


Generate precise billable hours reports
   Dates and times of support activity are no longer a vague guessing game. ObserveIT provides you with detailed reports
   showing every activity performed by your outsource support team.


Be sure that users confirm policy and user ticket info
   Keeping your IT environment running smoothly requires ongoing communications. For example, it may be critical that
   for the next two weeks, no one should run a trace on the production database between 07:00 and 14:00. You sent out
   an email to all you IT staff. But what about the various employees working for your 3rd party vendors? You may have told
   your point of contact, but did she deliver the message to each of her employees? And even if so, will they remember
   next time they log on? ObserveIT allows you to deliver these important policy messages to each user, exactly as they log
   on. By requiring users to confirm reading a dialog box before continuing with their session, you are assured that policy
   messages have reached their targeted users.
   This interaction can also be used to collect information from the user. If you have a support ‘ticket-number’ mechanism
   in place for tracking each support call, you can ask the user to type in the ticket number. By associating each user audit
   with a particular support issue, you have better knowledge of how your resources are being utilized.



Reduce the time to repair
  When you suffer a service outage and are seeking a resolution, the most impotant question to answer is “What
  happened on this server?” Change management tools may be able to show you ‘deltas’ of what config files or registry
  values were modified. But what caused those changes? Sometimes, a single checkbox in a user dialog box can trigger
  dozens of different changes on your system configuration.
  ObserveIT takes you straight to the root cause of the problem. Replaying each user session that occurred on the
  problematic server will show you exactly what needs to be undone. Instead of spending time wondering what might
  have triggered these config changes, you can simply undo the steps that were taken.




info@observeit-sys.com | www.observeit-sys.com

More Related Content

More from ObserveIT

Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramObserveIT
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...ObserveIT
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz WebinarObserveIT
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringObserveIT
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveITObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?ObserveIT
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App SecurityObserveIT
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachObserveIT
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinderObserveIT
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Whitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisWhitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisObserveIT
 

More from ObserveIT (20)

Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz Webinar
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity Monitoring
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Whitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisWhitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and Solaris
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

ObserveIT Remote Access Monitoring Software- Third Party Monitoring Solutions

  • 1. people audit Solutions Third Party Monitoring ObserveIT User Auditing improves server security and optimizes the outsource support ecosystem The Need: The increased use of contractors, offshore support teams and outsourcing suppliers exposes your corporate network to countless remote users. You’ve established a VPN and installed RSA tokens. But that is only the first step. You need to audit remote users, to be able to demonstrate what they are doing on your servers. Know who made each configuration change Validate SLA commitments and verify billable activity Reduce time-to-repair for config-based system outages In order to perform their assigned tasks, the outsource and 3rd party vendors that support your IT environment must have access your corporate network. But this access can not come at the expense of your intellectual property or sensitive data security! User recordings can be searched, navigated and replayed to identify any specific activity. Detailed reporting and real-time alerting ensures strict compliance with corporate security policies. ObserveIT gives you full visibility into all 3rd party remote user activity With ObserveIT on your network, you can review every action that takes place on your server network. No more fingerpointing, no more hunting for cause of changes, and no more wondering what they do on your servers once you give them access.
  • 2. Solutions people audit Third Party Monitoring ObserveIT Benefits for Third-Party Monitoring Improved security - A ‘security camera’ is the best deterrant against known-user security breaches. Accountability- Spend less time pointing fingers, and more time improving business. SLA validation - When both sides of the vendor-customer relationship can show precise SLA response time and billable activity, the level of trust and confidence. Policy messaging - Deliver critical information to remote users each time they log on. Get back on your feet faster - GFix server outages fast by seeing the root-cause of error, not just the symptoms. ‘Video Cameras’ on your servers –Security and deterrance via usage visibility Without user session recording, authorized users can do anything they want on your network once they log on. But when remote users know that every action is being recorded, they will be much less likely to be tempted into ‘funny business’. Just like a video camera at an ATM machine, it may not physically prevent theft, but it stops 99% of potential attacks before they start, by promising swift capture to any policy violators. In addition to the strong deterrent effect of user audit recordings, ObserveIT also provides real-time alerts about specific user activity, according to any policy rule you wish to track. And with window session playback available directly from within any network security platform (ex. SCOM, CA, OpenView), you can rest assured that any improper actions are stopped before they even get started. No more Fingerpointing: Eliminating doubt regarding who did what IT managers need to spend more time improving the company business, and less time playing the blame-game. Similarly, outsource vendors want to perform their assignments without concern about what they might be accused of doing. With full clarity of every action that took place on your servers, you are no longer left wondering who performed each action. Imagine a situation where a remote support technician logs on to for a routine maintenance task, performs the task, and then logs off. An hour later, you notice that 50,000 records in your customer transaction database were deleted. You may find it hard to believe that the support tech would have done it, but the direct timing relationship makes you suspicious. How can you be sure what he did while logged on? With ObserveIT, there is no room for doubt. Simply open the user diary, see a list of every file, application and resource that the tech used, and if necessary, replay a video of the full session.
  • 3. Solutions Third Party Monitoring people audit Know immediately if SLA commitments are fulfilled Most relationships between customers and outsource vendors are based on trust and experience. Support Level Agreements are a cornerstone of this trust, allowing IT managers to know that their needs will be met timely. But achieving an accurate measurement of support response time is not always easy task. ObserveIT gives you the ability to see exact timing of vendor activity, thus verifying the SLA commitments. Vendors enjoy the fact that doubt and subjective measurements are eliminated, with solid, objective timing providing proof of the high service quality being supplied. Generate precise billable hours reports Dates and times of support activity are no longer a vague guessing game. ObserveIT provides you with detailed reports showing every activity performed by your outsource support team. Be sure that users confirm policy and user ticket info Keeping your IT environment running smoothly requires ongoing communications. For example, it may be critical that for the next two weeks, no one should run a trace on the production database between 07:00 and 14:00. You sent out an email to all you IT staff. But what about the various employees working for your 3rd party vendors? You may have told your point of contact, but did she deliver the message to each of her employees? And even if so, will they remember next time they log on? ObserveIT allows you to deliver these important policy messages to each user, exactly as they log on. By requiring users to confirm reading a dialog box before continuing with their session, you are assured that policy messages have reached their targeted users. This interaction can also be used to collect information from the user. If you have a support ‘ticket-number’ mechanism in place for tracking each support call, you can ask the user to type in the ticket number. By associating each user audit with a particular support issue, you have better knowledge of how your resources are being utilized. Reduce the time to repair When you suffer a service outage and are seeking a resolution, the most impotant question to answer is “What happened on this server?” Change management tools may be able to show you ‘deltas’ of what config files or registry values were modified. But what caused those changes? Sometimes, a single checkbox in a user dialog box can trigger dozens of different changes on your system configuration. ObserveIT takes you straight to the root cause of the problem. Replaying each user session that occurred on the problematic server will show you exactly what needs to be undone. Instead of spending time wondering what might have triggered these config changes, you can simply undo the steps that were taken. info@observeit-sys.com | www.observeit-sys.com