Record hours logged in, websites visited, application usage, internet connections, documents opened, uploads/downloads and software installations.
Control access to infrastructure through application control, device control (i.e. disabling USB drives) and network access control (i.e. blocking server access to certain employees).
Track and mange the modification, copy, and destruction of computer-held assets identified as critical to the business.
Vulnerability audit for NIST, PCI-DSS, HIPPA and compliance management providing the template policy profile as well as logging capability.