SlideShare a Scribd company logo
1 of 3
Download to read offline
people audit




 Solutions
                                                 Third Party Monitoring
ObserveIT User Auditing improves server security
and optimizes the outsource support ecosystem
The Need:
The increased use of contractors, offshore support teams and outsourcing
suppliers exposes your corporate network to countless remote users.
You’ve established a VPN and installed RSA tokens. But that is only the first step. You need to audit remote users, to be
able to demonstrate what they are doing on your servers.


       Know who made each configuration change

       Validate SLA commitments and verify billable activity

       Reduce time-to-repair for config-based system outages
In order to perform their assigned tasks, the outsource and 3rd party vendors that support your IT environment must have
access your corporate network. But this access can not come at the expense of your intellectual property or sensitive data
security! User recordings can be searched, navigated and replayed to identify any specific activity. Detailed reporting and
real-time alerting ensures strict compliance with corporate security policies.


ObserveIT gives you full visibility into all 3rd party remote user activity
  With ObserveIT on your network, you can review every action that takes place on your server network. No more
  fingerpointing, no more hunting for cause of changes, and no more wondering what they do on your servers once you
  give them access.
Solutions

                     people audit                                         Third Party Monitoring


ObserveIT Benefits for Third-Party Monitoring
   Improved security - A ‘security camera’ is the best deterrant against known-user security breaches.
   Accountability- Spend less time pointing fingers, and more time improving business.
   SLA validation - When both sides of the vendor-customer relationship can show precise SLA
   response time and billable activity, the level of trust and confidence.

   Policy messaging - Deliver critical information to remote users each time they log on.
   Get back on your feet faster - GFix server outages fast by seeing the root-cause of error,
   not just the symptoms.




‘Video Cameras’ on your servers –Security and deterrance via usage
visibility
 Without user session recording, authorized users can do anything they want on your network once they log on. But
 when remote users know that every action is being recorded, they will be much less likely to be tempted into ‘funny
 business’. Just like a video camera at an ATM machine, it may not physically prevent theft, but it stops 99% of potential
 attacks before they start, by promising swift capture to any policy violators. In addition to the strong deterrent effect of
 user audit recordings, ObserveIT also provides real-time alerts about specific user activity, according to any policy rule
 you wish to track. And with window session playback available directly from within any network security platform
 (ex. SCOM, CA, OpenView), you can rest assured that any improper actions are stopped before they even get started.




No more Fingerpointing: Eliminating doubt regarding who did what
 IT managers need to spend more time improving the company business, and less time playing the blame-game.
 Similarly, outsource vendors want to perform their assignments without concern about what they might be accused of
 doing. With full clarity of every action that took place on your servers, you are no longer left wondering who performed
 each action.
 Imagine a situation where a remote support technician logs on to for a routine maintenance task, performs the task, and
 then logs off. An hour later, you notice that 50,000 records in your customer transaction database were deleted. You
 may find it hard to believe that the support tech would have done it, but the direct timing relationship makes you
 suspicious. How can you be sure what he did while logged on? With ObserveIT, there is no room for doubt. Simply open
 the user diary, see a list of every file, application and resource that the tech used, and if necessary, replay a video of the
 full session.
Solutions

                                                                              Third Party Monitoring
                     people audit


Know immediately if SLA commitments are fulfilled
  Most relationships between customers and outsource vendors are based on trust and experience. Support Level
  Agreements are a cornerstone of this trust, allowing IT managers to know that their needs will be met timely. But
  achieving an accurate measurement of support response time is not always easy task.
  ObserveIT gives you the ability to see exact timing of vendor activity, thus verifying the SLA commitments. Vendors enjoy
  the fact that doubt and subjective measurements are eliminated, with solid, objective timing providing proof of the high
  service quality being supplied.


Generate precise billable hours reports
   Dates and times of support activity are no longer a vague guessing game. ObserveIT provides you with detailed reports
   showing every activity performed by your outsource support team.


Be sure that users confirm policy and user ticket info
   Keeping your IT environment running smoothly requires ongoing communications. For example, it may be critical that
   for the next two weeks, no one should run a trace on the production database between 07:00 and 14:00. You sent out
   an email to all you IT staff. But what about the various employees working for your 3rd party vendors? You may have told
   your point of contact, but did she deliver the message to each of her employees? And even if so, will they remember
   next time they log on? ObserveIT allows you to deliver these important policy messages to each user, exactly as they log
   on. By requiring users to confirm reading a dialog box before continuing with their session, you are assured that policy
   messages have reached their targeted users.
   This interaction can also be used to collect information from the user. If you have a support ‘ticket-number’ mechanism
   in place for tracking each support call, you can ask the user to type in the ticket number. By associating each user audit
   with a particular support issue, you have better knowledge of how your resources are being utilized.



Reduce the time to repair
  When you suffer a service outage and are seeking a resolution, the most impotant question to answer is “What
  happened on this server?” Change management tools may be able to show you ‘deltas’ of what config files or registry
  values were modified. But what caused those changes? Sometimes, a single checkbox in a user dialog box can trigger
  dozens of different changes on your system configuration.
  ObserveIT takes you straight to the root cause of the problem. Replaying each user session that occurred on the
  problematic server will show you exactly what needs to be undone. Instead of spending time wondering what might
  have triggered these config changes, you can simply undo the steps that were taken.




info@observeit-sys.com | www.observeit-sys.com

More Related Content

More from ObserveIT

Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramObserveIT
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...ObserveIT
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz WebinarObserveIT
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringObserveIT
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveITObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?ObserveIT
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App SecurityObserveIT
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachObserveIT
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinderObserveIT
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Whitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisWhitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisObserveIT
 

More from ObserveIT (20)

Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz Webinar
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity Monitoring
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Whitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and SolarisWhitepaper: User Audit Options for Linux and Solaris
Whitepaper: User Audit Options for Linux and Solaris
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

ObserveIT Remote Access Monitoring Software- Third Party Monitoring Solutions

  • 1. people audit Solutions Third Party Monitoring ObserveIT User Auditing improves server security and optimizes the outsource support ecosystem The Need: The increased use of contractors, offshore support teams and outsourcing suppliers exposes your corporate network to countless remote users. You’ve established a VPN and installed RSA tokens. But that is only the first step. You need to audit remote users, to be able to demonstrate what they are doing on your servers. Know who made each configuration change Validate SLA commitments and verify billable activity Reduce time-to-repair for config-based system outages In order to perform their assigned tasks, the outsource and 3rd party vendors that support your IT environment must have access your corporate network. But this access can not come at the expense of your intellectual property or sensitive data security! User recordings can be searched, navigated and replayed to identify any specific activity. Detailed reporting and real-time alerting ensures strict compliance with corporate security policies. ObserveIT gives you full visibility into all 3rd party remote user activity With ObserveIT on your network, you can review every action that takes place on your server network. No more fingerpointing, no more hunting for cause of changes, and no more wondering what they do on your servers once you give them access.
  • 2. Solutions people audit Third Party Monitoring ObserveIT Benefits for Third-Party Monitoring Improved security - A ‘security camera’ is the best deterrant against known-user security breaches. Accountability- Spend less time pointing fingers, and more time improving business. SLA validation - When both sides of the vendor-customer relationship can show precise SLA response time and billable activity, the level of trust and confidence. Policy messaging - Deliver critical information to remote users each time they log on. Get back on your feet faster - GFix server outages fast by seeing the root-cause of error, not just the symptoms. ‘Video Cameras’ on your servers –Security and deterrance via usage visibility Without user session recording, authorized users can do anything they want on your network once they log on. But when remote users know that every action is being recorded, they will be much less likely to be tempted into ‘funny business’. Just like a video camera at an ATM machine, it may not physically prevent theft, but it stops 99% of potential attacks before they start, by promising swift capture to any policy violators. In addition to the strong deterrent effect of user audit recordings, ObserveIT also provides real-time alerts about specific user activity, according to any policy rule you wish to track. And with window session playback available directly from within any network security platform (ex. SCOM, CA, OpenView), you can rest assured that any improper actions are stopped before they even get started. No more Fingerpointing: Eliminating doubt regarding who did what IT managers need to spend more time improving the company business, and less time playing the blame-game. Similarly, outsource vendors want to perform their assignments without concern about what they might be accused of doing. With full clarity of every action that took place on your servers, you are no longer left wondering who performed each action. Imagine a situation where a remote support technician logs on to for a routine maintenance task, performs the task, and then logs off. An hour later, you notice that 50,000 records in your customer transaction database were deleted. You may find it hard to believe that the support tech would have done it, but the direct timing relationship makes you suspicious. How can you be sure what he did while logged on? With ObserveIT, there is no room for doubt. Simply open the user diary, see a list of every file, application and resource that the tech used, and if necessary, replay a video of the full session.
  • 3. Solutions Third Party Monitoring people audit Know immediately if SLA commitments are fulfilled Most relationships between customers and outsource vendors are based on trust and experience. Support Level Agreements are a cornerstone of this trust, allowing IT managers to know that their needs will be met timely. But achieving an accurate measurement of support response time is not always easy task. ObserveIT gives you the ability to see exact timing of vendor activity, thus verifying the SLA commitments. Vendors enjoy the fact that doubt and subjective measurements are eliminated, with solid, objective timing providing proof of the high service quality being supplied. Generate precise billable hours reports Dates and times of support activity are no longer a vague guessing game. ObserveIT provides you with detailed reports showing every activity performed by your outsource support team. Be sure that users confirm policy and user ticket info Keeping your IT environment running smoothly requires ongoing communications. For example, it may be critical that for the next two weeks, no one should run a trace on the production database between 07:00 and 14:00. You sent out an email to all you IT staff. But what about the various employees working for your 3rd party vendors? You may have told your point of contact, but did she deliver the message to each of her employees? And even if so, will they remember next time they log on? ObserveIT allows you to deliver these important policy messages to each user, exactly as they log on. By requiring users to confirm reading a dialog box before continuing with their session, you are assured that policy messages have reached their targeted users. This interaction can also be used to collect information from the user. If you have a support ‘ticket-number’ mechanism in place for tracking each support call, you can ask the user to type in the ticket number. By associating each user audit with a particular support issue, you have better knowledge of how your resources are being utilized. Reduce the time to repair When you suffer a service outage and are seeking a resolution, the most impotant question to answer is “What happened on this server?” Change management tools may be able to show you ‘deltas’ of what config files or registry values were modified. But what caused those changes? Sometimes, a single checkbox in a user dialog box can trigger dozens of different changes on your system configuration. ObserveIT takes you straight to the root cause of the problem. Replaying each user session that occurred on the problematic server will show you exactly what needs to be undone. Instead of spending time wondering what might have triggered these config changes, you can simply undo the steps that were taken. info@observeit-sys.com | www.observeit-sys.com