Effective Server Monitoring: Do you know what to look for ?

The scope of this document is to define the approach for the server activity monitoring feature.

Need– The server has very sensitive dblog (2)ata on it and it needs to be kept safe and along with that what is needed is continuous monitoring as the former can be addressed by placing it in a secure premise with very limited access but what is not controlled is the activity that is done because it can mess up the data present and lead to a severe discrepancies.

Concern- During the upgradation and updation of the files or database at the server, many manipulations need to be done at the server and along with that other malicious activities or unintentional manipulations can also be done by the user. To ensure the confidentiality, integrity and availability of the data at the server, continuous monitoring is required.

Our Approach- To address this problem, the customer can use inDefend to perform continuous screen monitoring of the computer application connecting to the server. This monitoring shall ensure that the screenshots that are taken are at a high frequency so that any commands, queries or requests sent to the server and the associated responses received can be checked using this mechanism. These rapid rate screenshots can be seen collectively as a movie, which will enhance the chances of capturing discrepancies during the connected session with server.

Dependencies-Using only one computer for setting up remote connection with the server

  • The credentials for the same shall be kept confidential and shared to only the authorized personnel

Know More: www.dataresolve.com

7 Funny Things employees might do over internet ;)

I was very busy over the phone when I  heard a weird ‘meow’ behind me and jumped off and looked around, only to find no traces of cats in the vicinity. Of Course, it is inside office and no one is allowed to get their pets. I continued with the conversation.Now I heard it again and saw all other around me laughing . On turning around to check what’s happening now, I saw Tom, with a head phone tucked around his head and ear, repeating ‘meow, meow, meowwww’ in different tones, pitches and rhythm- Oh, he is making an advertisement on ‘Tom and Jerry’ using a popular online application.Are you shocked?Don’tbe.There are many such funny and insane activities which even your employees do through the day which you are not aware of.

7K0A9927

7 Funny Things your employees might do over internet

1.Designing business cards

A small rectangular white paper containing name and designations always much higher than what they have.This is definitely not their business card.It surely belongs to one of their bosses.But then no problem our employees are masters in designing one of their own choice.They can design cards with all sorts of colourful background and gut-busting graphics of their bosses with grumbling faces shouting at their employees to depict their true mindframe.

2.Play 7 ways to kill your boss

I am sure you have read it twice.But I ensure you read it right.This is a place where they express their rage for their bosses.Playing this game not only gives them a chance to whack their bosses but also gives mental satisfaction.And with a smiling face they narrate it to their colleagues. “ Yippee,Today I have passed the fourth milestone in the process of killing  my boss”.Scary isn’t it?

3.Bitching about work online

It is the unfortunate reality of the tightly packed schedule of our employees.They are frustrated  because the little work they do is boring to them.So, they have ample time to  bitch about their work online to their colleagues and friends or sometimes post status on facebook related to their work or the boss.The topic of the chats are mind blowing “Why do we have to submit the report today the board meeting is next week”,”He is looking like a cartoon in his lemon yellow shirt”,”She has no work other than buttering her boss” ,”Are you sure he is sick or his reason of absence is something else” and many more such captivating sessions go on throughout the day.

4.Making a fake profile of your boss

Mr.Singh,divisional manager of a well known company got a call from one of his friends telling “What’s wrong with you from when have you started been so fond of clowns?”To this Mr.Singh kind of shouted What?Then his friend said that Yesterday he had received a friend request form Mr.Singh and the profile picture was of a clown,the status read “See I am the clown of the town………….”.And moreover the details said that previously you  were just an employee and suddenly got promoted as the divisional manager.Mr.Singh was taken aback.BeAware.We never know who is the next target?

5.Make peculiar searches

“How can I touch my nose from my tongue”,”How come when I talk to a girl in facebook and they don’t reply back”,”How easy do you think it is to sneak into the zoo because I need to see tigers right now?”,”Why does my kid asks me so many current affairs?”God I can rarely answer any.You are wondering why I am mentioning such phrases.It is a just a small specimen of what your employees search during their office hours.

6.Funny tweets

Nowadays,telecasts are so unsensible.If they don’t find any  storyline,the character is sent abroad for an important business deal for months.What crab! Only his voice is been heard, the actor is not seen.Why don’t they have cameras there?

God created the world in 7 days well it took 9 months to create me so definitely  I am a big deal.

I have finally figured out why I can’t lose this extra weight. The shampoo I use in the shower that runs down my body says, “for extra volume and body.

These are some of the many tweets which your employees are involved in after entering the office till,it’s time to leave.

7.Click instant photos and post them on social networking sites

With the advent of technology, every phone in hand,has a camera be it whatever megapixels.Our employees have all become part time photographers.But some are really good.If you just take , out some time and check all your facebook notifications,you’ll surely find some pictures of your employees, sleeping over there working desk.No no that’s just not the end.It has sound effects also where you can hear the snoring more clearly.

They are so hilarious that I shared it with my CEO and had a good laugh. At least for a day, the meeting went without a squabble.No doubt it makes us laugh or at times annoys us.Don’t you think, it’s time to get serious on this?It goes without saying that these so called funny activities account for a lot of productivity loss.This situation demands monitoring of employees at some points.

Please don’t look so stressed and remove your hand from your forehead.Because  now inDefend in cloud it just a few clicks away from you.Install it, and have a more closer and wider look, into to world of your employees.

Know More!!

www.dataresolve.com

Key Learnings – From CEO’s Desk

Issues with current approach:

 

– Intelligence on top of current data leak technology, it generates 100000…. Of alerts on a daily basis..how to handle this…only option hire a services firm to manage it…

 

– Integration with new apps and devices…not so easy…on the fly integration missing…..vendor processes and back end development cycle delays this….

 

– One great input DLP starts when some data in transit matches the policy and it gets picked up as an alert, what about before this….when an employee planning to leak….is data leak or loss is the only problem..what about productivity loss….?

 

– BYOD in use in current scenario but difficult to really execute….Challenges….enforcement of MDM and integrating the same with DLP…worst starts when we have multiple clients, multiple dashboards……

 

– One specific issue comes when it comes to managing PC resources, lot of end-points consumes huge processing power on desktops as poor end-point has multiple client for AV, DLP, Patch mgt and list goes on

 

– Replicating SIEM for end-points is a next view point 

 

– Last….are vendors really talking about co-creation….if they are….are they really executing?

 

Do share your opinion to create a secure working environment..

 

Cheers:)

 Dhruv Khanna-CEO Data Resolve Technologies

Appreciate your time.

Regards,

Dhruv Khanna 

CEO and Founding Team Member

Data Resolve Technologies

http://www.dataresolve.com

Myths that CISO’s can’t afford to believe!!

All the feel-good, psychological methods of improving employee productivity are great, but they’re ineffective without the right tools. To boost employee productivity organizations offered BYOD, Social media access during working hours, with all this, organization is exposed to data security and how to identify un-productive work force.

Global research studies have demonstrated that on an average employee productivity at a given point in time is less than 50% against pre-defined KRAs. This demonstrates that with all flexibility given to employees on account of productivity along-with data leak solution still employee productivity gets discounted and data leaks goes un-accounted.

It’s become utmost critical for CISOs now to go beyond Data leak concepts and enforce end-to-end employee monitoring covering aspects related to social media usage, employee behavior, web access patterns, off-line patterns, chat patterns etc.

Hence it’s imperative to have an end-point security analyticsframework that provides real-time end-point view to management to take effective decisions.

Two myths you can’t afford to believe:

  1. Data theft is not a problem for me — my company is too small. Data privacy is a concern for a large organizations. Data thieves and unscrupulous business associates are looking for opportunities to take advantage of any weakness or mistake across nook and corner irrespective of size as IP has no relation with organization size. Human vulnerability analysis is a point raised by multiple organization while releasing their risk management strategy.
  2. Tools are expensive and high maintenance required– With traditional approach lot of end point security clients are deployed with different management consoles and at the same time security aspects goes un-addressed.

Data Resolve inDefend Business Solution (End-Point Security Analytics platform from Data Resolve) is one of the emerging concepts to address above mentioned employee related issues.

About Author:

Dhruv Khanna is CEO and Founding Team Member of Data Resolve Technologies Pvt. Ltd. Data Resolve is started by group of alumni’s from IIT Kharagpur with client base on end-point security analytics in Indian and International market, for further inputs do connect with us.

Connect with us- marketing@dataresolve.com

Website- www.dataresolve.com