This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

NetWrix launches digital surveillance tool

Share this article:

A tool that records user activity for security, compliance, audit and troubleshooting has been launched by NetWrix.

Called the User Activity Video Reporter tool, it said that it acts like a surveillance camera for critical servers and other IT systems by capturing metadata during the recording process, which allows IT administrators to fast- forward or link directly to specific tasks or actions.

Available as a standalone product or as part of the powerful NetWrix Change Reporter Suite, it said that the monitoring software provides complete visibility of IT systems and applications that may not produce logs or enough information to investigate user behaviour.

Aidan Simister, country manager (UK & Ireland) for NetWrix, said: “Complete visibility over critical IT systems can be difficult, inefficient and expensive, but without ‘who, what, when and where' audit detail, vital issues can go undetected and unresolved, risking security and compliance as well as compromising auditing requirements and troubleshooting.

“Our new User Activity Video Reporter captures every single user action for forensic review without having to filter through thousands of hours of activity or reports.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.