Free server surveillance

April 2009 Information Security

Free server protection software offered to all South African companies.

To help reduce the threat against vulnerable and dispersed server infrastructures, Magix Integration has announced the local availability of ObserveIT, a simple management tool that seamlessly records all activities performed on one or more servers in a visual Server Diary in realtime.

In addition, Magix Integration is also offering all South African companies and organisations, irrespective of size or location, a limited version of ObserveIT-Express for free. The application is available as a download from Magix Integration’s home page www.magix.co.za. ObserveIT-Express offers the power of ObserveIT-Pro, but limits the user to recording the activities on a maximum of five servers over a 24-hour period. The full version has no maximum number of servers or length of time activities can be stored.

Amir Lubashevsky, executive director of Magix Integration says, “Up till now many South African businesses have left their server infrastructures vulnerable to human error and malice as more servers are booted up in remote locations and accessed by different people for different reasons. This state of affairs makes these servers almost unmanageable as more people have access to previously restricted functionality, making it impossible to control who does what until long after the fact. ObserveIT will change this.”

Amir Lubashevsky, executive director, Magix Integration
Amir Lubashevsky, executive director, Magix Integration

ObserveIT does not capture the activities on a server in text format as traditional log files do, but it offers users video recording capabilities that allow management to actually see what users did and when they did it, whether logged in on site or remotely. ObserveIT also offers location-based and free-text searching, allowing users to search for specific activities on any number of servers, or for any activities performed by certain users over a defined period of time.

“To ensure users do not make mistakes on certain screens, ObserveIT allows administrators to add Sticky Notes to any management interface,” adds Lubashevsky. “This ensures each user will be warned to do or not to do something by a pop-up note whenever they open a specific window.”

A question stressed IT managers always ask when confronted with video recording is how much storage space will be required by the application. ObserveIT uses a highly compressed format that only requires about 75 gigabytes of space to record the activities of 1000 servers per year. This is possible as the system only records activities, whether entered via keyboard or mouse, performed locally or remotely, while periods of inactivity are not recorded.

“ObserveIT also provides management with audit trails per server or an aggregated report for a number of servers,” says Lubashevsky. “Moreover, ObserveIT Identification Services identifies the actual user, even when using generic Windows login names like Administrator, giving the company full control over all its servers.”

A free copy of ObserveIT-Express can be downloaded from Magix Integration’s home page www.magix.co.za

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, amirl@magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.