Amir Lubashevsky

Amir Lubashevsky
critical data effective ensure factor flowing monitor program requires security selecting software tied
A critical factor in selecting monitoring software is to ensure it is not tied to any one vendor. Effective security requires an independent program able to monitor data flowing from and to any application, irrespective of format, vendor or version.
actions assigned corporate possible sure track user
It is possible to track a user's actions on a corporate network, but it is not possible to be 100% sure that the person logged in is the user who was assigned the identity.
provide says stranger users
Some users will provide their password to a stranger who says he is from their company's IT department.