Subscribe
  • Home
  • /
  • Security
  • /
  • HCMT to launch its award-winning internationally-proven employee computer activity monitoring software at IT...

HCMT to launch its award-winning internationally-proven employee computer activity monitoring software at ITWeb Security Summit

The company will launch its employee computer activity monitoring solution at the ITWeb Security Summit, in Sandton, on 10 and 11 May 2011.

By HCMT
Johannesburg, 09 May 2011

The pervasiveness of network technology, including cloud computing, is causing a shift in the location of digital data. Data that was once found mainly on individual disc drives, tied to an individual, is now becoming distributed across company networks, on remote network machines under the control of multiple independent organisations, and scattered over multiple jurisdictions.

ITWeb's Security Summit 2011

More information about the ITWeb's Security Summit 2011, which takes place from 10-12 May 2011, at the Sandton Convention Centre, is available online here.

In addition, live network data acquisition from increasingly higher and more abstracted application layers across the network, is complex and time-consuming to extract.

These factors are limiting the effectiveness of traditional network monitoring tools; not only do these tools have to deal with the problem of retrieving data from independent locations, but also the collation of this data from many disparate network sources is rendering the monitoring process incomplete, as all data may not be retrieved, and hence monitored and investigated.

It is with this in mind that HCMT will launch its Employee Computer Activity Monitoring solution at the ITWeb Security Summit, in Sandton.

Uniqueness of HCMT solution

Our powerful technology enables the monitoring of employee computer activity across the company, day and night, 365 days a year.

Through the first-of-its kind software monitoring tool, this technology will:

* Collect all computer activity and event data from the employee's computer. Since the data is collected from a single source, ie, the source of its creation, this avoids the task of having to retrieve this computer activity and event data from external independent and disparate locations, and circumvents the necessity for the collation of this disparate data, thus ensuring the completeness of that data.
* Take all of these recorded activities and events, including screenshots, from each of the monitored computers, store them in a secure central database of all computer activities and events, and make them immediately available in easily accessible formats.
* Provide context by recording via screenshots, in exact detail, all activities and events occurring on the monitored computer. This provides an overall view of the situation, making the data irrefutable.

With traditional network monitoring tools, the data is extracted from different logs and records situated across the network; there is no single source. The data that is extracted is normally the end result of the activity or event, and not the actual details of that activity or event, as they transpired. There is no single database of all employee computer activities and events, and the collation of information and data normally requires a time-consuming investigation.

Employee computer activity monitoring fills the gaps where network monitoring falls short.

Effective monitoring

* The software requires no manual intervention. It continues its monitoring in the background and makes the data available for reporting and alerts. Reporting and alerting can be automated.
* Where network issues become evident the full details behind the incident are immediately available for review, from high-level charts to actual screenshot recordings. The technology can display all the events and activities that were recorded today, yesterday, last week, for a specific month, or over an entire quarter or year. One can focus on one employee, a department or everyone within the company. Furthermore, one can consolidate and review all activities and events or isolate a specific activity, or group of activities and events.
* The technology revolutionises end-user troubleshooting and support. It makes available to the end-user support person an immediate sequence of events that the end-user has encountered.
* The forensic discovery process is enhanced dramatically as irrefutable evidence is always available and is easy to access.
* A single database holds records at an employee level, enhancing the ability to assist with productivity and efficiency issues. One can use data as an effective part of the employee review process, learn employee work patterns, use data to compare performance between employees or teams, and understand which employees are productive and on which applications.
* With the advent of the PPI Act, the technology will assist in meeting and exceeding all compliance requirements by seamlessly maintaining irrefutable records of all employee computer communications.

Employee computer activity monitoring closes the gap in effective monitoring, safeguards valuable company data and IT resources, and takes activity monitoring to the next level.

Please visit HCMT at stand 10 at the ITWeb Security Summit for more information.

Share

Editorial contacts

Mike Fisher
HCMT
(082) 332 8302