Tag Archives: bypassing company policies

The Essential Guide to Privileged Activity Monitoring

Key Security Risks related to Privileged Users “78% of large organizations were attacked by an unauthorized outsider in the UK, in 2012.” – Information Security Breaches Survey 2013 Business users accessing sensitive data Privileged users are a potential security risk in … Continue reading

IT Security News and Event, Shell Control Box , , , , , , , , , ,

Use Shell control box for remote access monitoring

General overview about the product Shell Control Box (SCB) is an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB acts as an application level proxy … Continue reading

MAS Technology Risk Management Guidelines, Shell Control Box , , , , , , , , , , , , , , , , , ,