Free server surveillance

April 2009 Information Security

Free server protection software offered to all South African companies.

To help reduce the threat against vulnerable and dispersed server infrastructures, Magix Integration has announced the local availability of ObserveIT, a simple management tool that seamlessly records all activities performed on one or more servers in a visual Server Diary in realtime.

In addition, Magix Integration is also offering all South African companies and organisations, irrespective of size or location, a limited version of ObserveIT-Express for free. The application is available as a download from Magix Integration’s home page www.magix.co.za. ObserveIT-Express offers the power of ObserveIT-Pro, but limits the user to recording the activities on a maximum of five servers over a 24-hour period. The full version has no maximum number of servers or length of time activities can be stored.

Amir Lubashevsky, executive director of Magix Integration says, “Up till now many South African businesses have left their server infrastructures vulnerable to human error and malice as more servers are booted up in remote locations and accessed by different people for different reasons. This state of affairs makes these servers almost unmanageable as more people have access to previously restricted functionality, making it impossible to control who does what until long after the fact. ObserveIT will change this.”

Amir Lubashevsky, executive director, Magix Integration
Amir Lubashevsky, executive director, Magix Integration

ObserveIT does not capture the activities on a server in text format as traditional log files do, but it offers users video recording capabilities that allow management to actually see what users did and when they did it, whether logged in on site or remotely. ObserveIT also offers location-based and free-text searching, allowing users to search for specific activities on any number of servers, or for any activities performed by certain users over a defined period of time.

“To ensure users do not make mistakes on certain screens, ObserveIT allows administrators to add Sticky Notes to any management interface,” adds Lubashevsky. “This ensures each user will be warned to do or not to do something by a pop-up note whenever they open a specific window.”

A question stressed IT managers always ask when confronted with video recording is how much storage space will be required by the application. ObserveIT uses a highly compressed format that only requires about 75 gigabytes of space to record the activities of 1000 servers per year. This is possible as the system only records activities, whether entered via keyboard or mouse, performed locally or remotely, while periods of inactivity are not recorded.

“ObserveIT also provides management with audit trails per server or an aggregated report for a number of servers,” says Lubashevsky. “Moreover, ObserveIT Identification Services identifies the actual user, even when using generic Windows login names like Administrator, giving the company full control over all its servers.”

A free copy of ObserveIT-Express can be downloaded from Magix Integration’s home page www.magix.co.za

For more information contact Amir Lubashevsky, Magix Integration, +27 (0)11 258 4442, amirl@magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.