Features
Graphic dashboards with risk and threat information;
Alerts with detailed information about the occurrence of suspicious activity;
User session analysis with record of abnormality in reports;
Audit, command alert, and blocking capabilities, even for privileged users;
Recording of command input and output logs;
Command scoring according to the level of risk of each command;
Identification of lateral movement and privilege escalation;
Suspicious activity alerts sent to SIEM/SYSLOG.