info@amalit.ae +971 4 3599916 amalit
 

Get answers to critical security and compliance questions

Promote better security, auditing and compliance in your organization by capturing, alerting and reporting on all user logon and logoff activity. Change Auditor for Logon Activity uses a centralized view to offer:

  • System-wide visibility
  • Consolidated auditing reports
  • User activity analyses
  • Automated logon and logoff event collections
  • Calculated user session events

Get the answers to all your critical security and compliance questions, and simplify IT governance now.


Features


Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

At-a-glance display

Tracks critical end user and administrator logon activity with detailed information on who, what, when, where, why and from which workstation.

Compliance-ready

Fulfills and simplifies the collection of logon activity for major external regulations and internal security policies.

Real-time alerts on the move

Sends critical alerts on access attempts (both successful and failed logons) via email and mobile devices to prompt immediate action, enabling you to respond faster to security threats even while you're off-site.

Security awareness

Easily discerns user logon and logoff by type (interactive, remote, local or network) and length of session to help identify suspicious activity.

Related searches

Provides instant, one-click access to all information on the event you’re viewing and all related activity, eliminating guesswork and unknown security concerns.

Change auditing

Delivers a complete solution for auditing user activity from start time to end time about change events (when combined with other Change Auditor modules).

Best practice reporting

Provides system visibility with comprehensive reports for best practices, such as access reports, successful logons, failed logons, authorization comparison reports and reports grouped by users.

Role-based access

Configures access so auditors can run searches and reports without making any configuration changes to the application, all without involving the administrator.

Event timeline

Enables the viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.

Web-based access with dashboard reporting

Searches from anywhere using a web browser, and creates targeted dashboard reports that provide upper management and auditors with access to the information they need without having to understand architecture or administration.

View more details
© 2017 All Rights Reserved.
Amal IT