RecordTS – The Best Replacement for Citrix SmartAuditor & Session Recorder

RecordTS – The Best Replacement for Citrix SmartAuditor & Session Recorder

TSFactory’s RecordTS is a powerful, efficient, high performance recording solution for Citrix XenApp, XenDesktop virtual desktops as well as for VMware Horizon and RDS. RecordTS session recorder captures video of all on-screen activity – with technology that’s more reliable than Citrix SmartAuditor. RecordTS is the best alternative to replace Citrix SmartAuditor. Affordable, robust and reliable. Security and Compliancy Assistance Recording sessions allows you to monitor access to files or programs that contain sensitive or confidential information; for example financial data, customer information,…

Read More Read More

Introducing RecordTS v4 – Record in the Cloud

Introducing RecordTS v4 – Record in the Cloud

RecordTS v4 takes a big step forward in helping customers combat insider threats. It allows you to know what your vendors, employees, and privileged users are doing. Knowing what users are doing with your company information is a key piece of telling a better security story. Our newest version of RecordTS is better than ever! What’s New With RecordTS v4? Native storage server, up to 40x faster than SQL databases Export stored sessions to a common video format for portability Universal…

Read More Read More

TSFactory Receives 5 Star Review from Leading IT Security Magazine

TSFactory Receives 5 Star Review from Leading IT Security Magazine

TSFactory received a 5 star review in SC Magazine, the leading source of specialist information and intelligence for those working in IT security. The review highlighted the ease of use, forensic management of data and good, scalable performance. In SC’s review they note, while monitoring remote sessions may not be the first thing you consider when you are planning DFIR, if you are accessing servers and critical/sensitive workstations remotely you should strongly consider RecordTS, no matter what the size of your…

Read More Read More

Why Cloud Providers Should Partner with Third Parties to Offer SECaaS

Why Cloud Providers Should Partner with Third Parties to Offer SECaaS

Today’s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to expose that sensitive information. These threats are concerning for businesses of all sizes and across all industries — especially in healthcare and finance where laws…

Read More Read More

The 5 Basic Cybersecurity Mistakes You Make Everyday

The 5 Basic Cybersecurity Mistakes You Make Everyday

We like to think we’re quite savvy when it comes to cybersecurity at work, but it is easy to make common mistakes that can have far reaching consequences. One singular incident can cause stolen data, diminished customer confidence, reputational harm and compliance penalties that can be costly. Bad Password Practice Bad password practice is one of most well known cybersecurity risks, yet it continues to be a pervasive problem in many organizations. Innumerable data breaches are caused by poor password…

Read More Read More

Virtualization Desktop Infrastructures: The History, Benefits and Drawbacks

Virtualization Desktop Infrastructures: The History, Benefits and Drawbacks

Virtual desktop infrastructures (VDI) is a desktop virtualization approach in which a desktop operating system, typically Microsoft Windows, runs and is managed in a data center. The desktop image is delivered over a network to an endpoint device, which allows the user to interact with the OS and its applications as if they were running locally. The endpoint may be a traditional PC, thin client or a mobile device. In 2006, Virtualization Desktop Infrastructures (VDIs) began to emerge as an…

Read More Read More

5 Reasons Your Company Should Monitor its Employees’ Computers

5 Reasons Your Company Should Monitor its Employees’ Computers

  And Not Just to See If They’ve Been on Facebook   Compliance Many industries have data and employee monitoring requirements, requiring log collection and monitoring systems which provide an audit trail of all access and activity to sensitive business information. One of the most well known is HIPPA, the US healthcare industry legislation which provides data privacy and security provisions for safeguarding medical information. American financial services are regulated by SOX, a series of regulations enacted in response to…

Read More Read More

WannaCry & the Blame Game

WannaCry & the Blame Game

WannaCry and the Difficult Task of Preventing a Similar Attack The first wave of the ransomware attacks that inundated businesses around the world last week has apparently now passed, although it’s quite possible more infections will occur. The finger pointing continues between the infected institutions and the companies and governments they believe could prevent outbreaks: Microsoft, the NSA, Russia, and even North Korea. But who is to blame? Like most things, everyone is at least partly responsible. The real question is…

Read More Read More