Download PAM Document

User authentication and access control

Local user authentication
User authentication through Active Directory
Ability to define one or more inspection groups that have the ability to monitor user sessions.

Ability to define one or more inspection groups that can monitor user sessions.

Ability to search in the titles of opened windows
Ability to search for texts viewed by users
Ability to search for words typed by users

Support for access protocols

Remote Desktop Protocol (RDP)

Virtual Network Computing (VNC)

Secure Shell (SSH)

Monitor user meetings and record them as video

Saving each user session as a separate movie
Encryption of recorded videos

Live monitoring of user meeting sessions

Possibility of live monitoring of user activity
Ability to terminate user session

Filtering capability

Command filtering
Filtering executable programs

Filtering executable programs

No need to install software on the server or user computer
Lack of user awareness of continuous monitoring and supervisory management
Prevent PAM service monitoring detection on the network and no impact on server performance

Support transparency in performance

Ability to view and select servers available to users
Alert users about the existence of monitoring processes

Possibility to copy exchanged information

Copying files and information exchanged between users and servers

Event registration

Recording important events of servers and network equipment

High accessibility

High availability and fault tolerance
Ability to automatically synchronize between plugin servers

Interaction with security incident and event management systems

Ability to send events to monitoring systems
Providing various reports for analyzing security events