system security |
The System Security Module ensures full system security. It has a comprehensive permissions infrastructure, the means to secure sensitive information, full data integrity checking, and the facility to set up and produce audit trail analyses.
|
Establish who and what will be tracked | |
Perform an audit trail analysis (find out who did what and when) | |
PCs can be set to lock themselves after a certain number of minutes | |
Full table scans can be scheduled and/or manually executed | |
Perfect data integrity (hacker-aware) | |
All restricted information is encrypted | |
Access to confidential/sensitive information controlled | |
An automatic PC lock serves for user safety.
|
Indicate which services need tracking and which users must be tracked. For ease of use a module selection minimizes the search criteria.
|
This reveals all tasks added, changed and deleted within a specified period of time. By showing records of the user, date and time; which makes for accurate results.
|