Description de Veriato Workforce Behavior Analytics
Le logiciel de surveillance des salariés Veriato offre une visibilité inégalée sur les activités en ligne et les communications des employés et contractuels. Veriato 360 est le système d'enregistrement qui présente des données détaillées, précises et exploitables à utiliser pour réagir aux incidents, pour la surveillance des initiés à haut risque et faire des rapports de productivité. Veriato 360 convient parfaitement aux entreprises de 10 employés ou plus.
Qui utilise Veriato Workforce Behavior Analytics ?
Toute organisation cherchant à détecter la fraude par les employés ou le vol de données. Veriato 360 est également utilisé pour résoudre des problèmes de productivité.
Veriato Workforce Behavior Analytics ne vous convainc pas tout à fait ?
Comparer avec une alternative populaire
Veriato Workforce Behavior Analytics
Alternatives à Veriato Workforce Behavior Analytics
Avis sur Veriato Workforce Behavior Analytics
Veriato Recon Review
Commentaires : Veriato solutions are excellent products for detecting and mitigating employee threats.
The software is very affordable compared to similar products on the market that are quite expensive. The user interface is easy to navigate, and the information provided on potential employee threats is outstanding. I provide training and consulting services related to Insider Threat Programs, and Insider Threat Mitigation (www.insiderthreatdefense.us). I have recommended Veriato Recon and Veriato 360 to my 500+ clients. Many have purchased Veriato products and are quite please with both products.
I cant find anything I don't like about Veriato products. As part of my consulting for my clients, I review various employee threat detection tools and make recommendations. Veriato products are my # 1 recommendation to my clients.
Good comprehensive monitoring
Commentaires : While the initial motivation for installing this system was to get evidence of an employee exfiltrating company data, we use it most often to ensure that people are being productive and not doing unauthorized things. We had a ransomware infection incident a couple years ago, and Veriato 360 captured the source of the user action that started it, recording his opening of a junk email and clicking through two subsequent warnings before launching the infected attachment. That information was priceless. As an software developer of internal applications, I have also used it to investigate bug reports from users. On a couple of occasions, users swore they did something one way but the screen shots and keystroke logs said otherwise. Objective evidence has saved me a lot of time fixing something that wasn't broken. As I described in my "like least" list, the recorder sometimes stops getting web site data. By recording multiple data streams, you can get what you need even if some data is not available (e.g., if web site recording is not present, window titles will probably let you find what you are looking for, and screen shots show what the user saw; if "Online Searches" data is not recorded, keystrokes into the browser can provide the data). There are tons of features that I have not used. It can send alerts on keywords detected in the data. It can display graphs of usage sliced in different ways. There is a recorder for Mac. I can't comment on how well they work.
Veriato 360 can capture just about any information you can think of from user sessions - web sites visited, emails, instant messages and chat, files transferred and printed, keystrokes, and screen shots, and network data summaries. - It is easy enough to navigate, even if you don't use the system that often. - It can export data to spreadsheets, text, html, and xml files for further analysis. - It can block selected web sites. - Captures all monitors in screen shots - Client systems can buffer up data for weeks while they are out of contact with the server (or when the server is down), e.g. remote laptops and systems that only connect by VPN once in a while. - Operation is generally invisible to users if you want it to be stealthy. - Tech support is helpful. - Users can be created to allow limited access to browse the collected data, for example to let managers review their assigned employees.
It takes a fair amount of effort to keep the system working. - Frequent client recorder updates are required to keep pace with web browser updates. When browser updates get ahead of the corresponding Veriato updates, web site recording stops. - Updates are often trapped by anti virus software like Windows Defender until IT staff updates the exclusion lists and deploys them (e.g. by group policy). We have to do that ourselves. - The system sometimes fails to start all the services required to collect data from the client systems, and getting it working again may take fiddling with service start delays and calls to tech support. At least the client systems buffer a lot and tech support is reasonably responsive. I have to periodically check that the system is working. - The amount of history you can record is limited by what fits in a SQL Server Express database (10G; screens shots are stored as separate files) unless you have or buy a SQL Server license. - Sometimes the recorder drastically affects client programs. We have had to disable email recording on only one or two systems where Thunderbird suddenly became unusably slow. On dozens of other systems it works fine - go figure. We had one conflict with a camera application that had to be resolved by sending a camera and software to Veriato so they could observe the problem and develop a fix. - No Linux support. Microsoft's Windows 10 updates have been so unreliable this year that I'd love to switch, but I need recording...
Antiquated Monitoring System
We've used Veriato since before they were acquired (formerly SpectorSoft).
Our use case: Recording systems ad-hoc for legal review purposes (disgruntled or departing employees).
If an employee does something malicious (data exfiltration, deletion, etc.), the software is only effective to verify what was done after the fact. Alerting is not very good. That said, it's a great value for the money if you're not intersted in real time user behavior analytics.
Reasonably priced Good US-based tech support
Very outdated compared to peers No user behavior analytics Resource intensive - client side Difficult to deploy to remote machines Not all features work the way you'd want them to
Réponse de l'équipe de Awareness Technologies
il y a 5 ans
Investigator, while a great product is really designed for temporary or short term directed investigations. Our Recon product does include behavior analytics and when coupled with our 360 product provides a holistic Insider Threat Management platform. Our AI is advanced and will be looking at devices, files, locations, skype conversations, etc. It will understand the sentiment in the language of the monitored users and identify changes from positive to negative. Our product will review a user's normal behavior over the course of a rolling 21 day period to set the baseline and identify trends moving forward, for activity, then provide alerts if anything exceeding the norm occurs. It compares the dynamic baseline to current behavior. This will raise awareness for the need of best practices education on company policies as well; (such as use of USB drives, uploading documents and where, etc.). Cerebral is able to compare 1:1 and 1:Many.
Was a Great software when it was spectorsoft, terrible now.
Commentaires : Does NOT work as described. Described functioning of software is ALL IN THEORY. I've called to help with setup more than once before I gave up. They take you through a few steps, and tell you what to do for the next few because they are impatient to help through the whole setup. When setup fails you call back and same process. That's happened 4 times before I gave up. 2 year license I still can't get working. -- Each time you call up the tech is VERY KNOWLEDGEABLE (I'll give them that), but they get off the phone once you wake them up from sleep (TWICE it sounded like they just rolled out of bed and were walking through the house, doors closing etc..) and with all that my system is still not working. After 2017 I decided not to renew because of the setup issues (never worked) and I was convinced again by sales they would help with entire setup, I shouldn't have issues, I'm sorry, etc.. 2018, same problem 4 calls to tech support setup. still not working on ANY system (we have 4 PCs to monitor in our office). BTW, they have to call you back for support, It hasn't been convenient to continue on to a 5th tech. We have used the old version spectorsoft for years, hate the new one. be warned.
the features of the software are still there, In THEORY, the features are great for a networked office, it attempts to work correctly, it logs just about everything.
sales - excellent they will work a million ways and contact you the same amount of time till you make payment. software setup - terrible! beyond terrible. customer support for setup - worse..
Solid Application Backed By Great Tec Support
Commentaires : Quick to Install, Price for the level of protection and upkeep cost extremally reasonable.
I think the true value of this application besides the implied protection form RansomWare is a good server side file revisioning and quick restore system. We have used this product to recover deleted files that would otherwise cause lost employee hrs. Nightly backups may be getting done but when your employee has lost a document (deleted by accident, saved overtop of the wrong file..) they spent a few hrs on, you can easily and quickly restore the file. Far faster then going though any backup/restore process.
Nothing I can think of, anytime we had a slight glitch Tech support has been over helpful, including hopping on our system to just sort out things rather then just pointing me to a bunch of technobabble documents that may not apply to my exact issue like usually happens.
Logiciel trouvé dans
- Logiciels d'analyse criminelle
- Logiciels PAM (Privileged Access Management)
- Logiciels de HR analytics
- Logiciels de surveillance des employés
- Solutions DLP (Data Loss Prevention)
- Logiciels RMM (Remote Monitoring and Management)
- Outils de reporting
- Logiciels de productivité
- Outils de BI
- Outils de télétravail