Industries

  Contact Centers Problem Many organizations require software which records employee’s computer activities which can be shown to others for training purposes. Let’s say someone calls into the helpdesk with a one-off issue that’s hard to reproduce. You’ve recorded their session and everything the user has done in that session is included in the recording, […]

Continue reading


Contact Centers

Problem Many organizations require software which records employee’s computer activities which can be shown to others for training purposes. Let’s say someone calls into the helpdesk with a one-off issue that’s hard to reproduce. You’ve recorded their session and everything the user has done in that session is included in the recording, including all the […]

Continue reading


Government

Problem While government network security and solutions to cyber terrorism are a major concern for government cybersecurity, the case of Edward Snowden clearly showed that the biggest threat comes from within. And while most government organizations employ detailed background checks, it is hardly enough to prevent insider attacks. Data leaks and data misuse can prove […]

Continue reading


Financial Services

Problem Financial services is an industry plagued with exceptionally high levels of insider breaches and information misconduct. Banks, insurers, and investment companies have access to millions of customer’s personally identifiable information (PII) as well as self-developed intellectual property which they have to protect. In order to stay ahead of the game, organizations in the financial […]

Continue reading


Technical Services

Technical services companies include those who provide IT services, Managed Service Providers (MSPs), infrastructure services, cloud services and more. These organizations power the modern world, and are often hit with insider attacks as a result. The Problem They suffer from risks as theft of intellectual property, disruption of IT operations, exfiltration of customer data and […]

Continue reading


Proctoring & Training

Proctoring Now that exams are moving from pen and paper to computers, it has become necessary for proctoring to become more sophisticated. Enter RecordTS. How it Works RecordTS records user activity on the server. A student logs into a university’s computer and immediately RecordTS begins recording the student’s session and continues to do so until […]

Continue reading


Healthcare

Problem The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, […]

Continue reading