End Point Detect and Response (EDR)

RM Enteprise records every detail:

  • Emails : Archives every email sent or received using the corporate mail and sent via webmail such as Gmail with all file attachments. 
  • Chat & IM : Record a complete copy of both sides of chat and instant messaging conversations. 
  • Website Activity : Tracking websites visited, search queries, social networking activities and exact time of activity. 
  • Network Activity : Tracking network connections application with the time and address connection. Capture files sent via ftp or uploaded to cloud storages. 
  • File & Document Track : Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed. Creating shadow copies. 
  • Application Usage : Know when the application was used, what was done while open and how much time is used by the application. 
  • Screen Capture : RM Enterprise can take screenshots of the desktop at specific intervals, when changing the active window, and also record a continuous video screen. 
  • Keystrokes : Capture communications activity in traditional email clients as well as many popular webmail services, and have a searchable system of record that can be alerted and reported on. 
  • Mic Recoding : Hear what happens in the office through microphones connected to computers. Feature helps to reveal the fraud.

How it works:

Provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity. 

  1. Collect
    • Collect all activity events at the end points for subsequent analysis, notifications and decision making.
  2. Analyze
    • Automatic and statistical analysis of data to detect anomalies of user behavior, identify incidents, insiders and disloyal employees.
  3. Alert
    • Automatic alerts about violations of security policies, dangerous and unproductive activities of employees.
  4. Report
    • Pre-configured & self-made reports width periodic e-mail sending. You can easily create reports with a powerful constructor.
  5. Block
    • Blocking access to "negative" sites, running applications and removable USB-storages to reduces the risk of malware infection and increase employee productivity.
  6. Review
    • Search for all data for keywords and regular expressions, easy correlation & drilldown allows you to find data cleared from noise in a few clicks.
 
Copyright © 2024 All rights reserved - PT NEOTECH CAKRAWALA INDONESIA