{"id":7148,"date":"2023-07-17T05:41:43","date_gmt":"2023-07-17T05:41:43","guid":{"rendered":"https:\/\/vansinfotech.com\/Mellon1\/?page_id=7148"},"modified":"2023-07-17T05:48:17","modified_gmt":"2023-07-17T05:48:17","slug":"user-activity-monitoring","status":"publish","type":"page","link":"https:\/\/vansinfotech.com\/Mellon1\/user-activity-monitoring\/","title":{"rendered":"User Activity Monitoring"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7148\" class=\"elementor elementor-7148\">\n\t\t\t\t\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-b6a98f7 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default ct-header-fixed-none ct-row-max-none\" data-id=\"b6a98f7\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;gradient&quot;}\">\n            \n                        <div class=\"elementor-container elementor-column-gap-extended \">\n                    <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b44b221\" data-id=\"b44b221\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap elementor-element-populated\">\n                                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bd6c6f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default ct-header-fixed-none ct-row-max-none\" data-id=\"bd6c6f7\" data-element_type=\"section\">\n            \n                        <div class=\"elementor-container elementor-column-gap-default \">\n                    <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d7dc4db\" data-id=\"d7dc4db\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap\">\n                                    <\/div>\n        <\/div>\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-145ff2f\" data-id=\"145ff2f\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap\">\n                                    <\/div>\n        <\/div>\n                            <\/div>\n        <\/section>\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a9af20d elementor-section-boxed elementor-section-height-default elementor-section-height-default ct-header-fixed-none ct-row-max-none\" data-id=\"a9af20d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n            \n                        <div class=\"elementor-container elementor-column-gap-default \">\n                    <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-39308d0\" data-id=\"39308d0\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap elementor-element-populated\">\n                        \t\t<div class=\"elementor-element elementor-element-d387ac8 elementor-widget elementor-widget-ct_heading\" data-id=\"d387ac8\" data-element_type=\"widget\" data-widget_type=\"ct_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div id=\"ct_heading-d387ac8\" class=\"ct-heading h-align- sub-style1 ct-heading-left item-st-default\">\r\n\t<div class=\"ct-inline-css\"  data-css=\"\r\n        \">\r\n    <\/div>\r\n        <h3 class=\"item--title st-default case-animate-time\" data-wow-delay=\"ms\">\r\n                <span class=\"sp-main\">\r\n            \r\n            User Activity Monitoring\n\r\n            \r\n                    <\/span>\r\n            <\/h3>\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39f691a elementor-widget elementor-widget-text-editor\" data-id=\"39f691a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>User activity monitoring (UAM) solutions are software tools that monitor and track end user behavior on devices, networks, and other company-owned IT resources. Many organizations implement user activity monitoring tools to help detect and stop insider threats, whether unintentional or with malicious intent. The range of monitoring and methods utilized depends on the objectives of the company.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-186d53e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"186d53e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/vansinfotech.com\/Mellon1\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-list.min.css\">\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Video recordings of sessions<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Log collection and analysis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network packet inspection<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keystroke logging<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Kernel monitoring<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">File\/screenshot capturing<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\n        <\/div>\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-285c041\" data-id=\"285c041\" data-element_type=\"column\">\n            <div class=\"elementor-widget-wrap elementor-element-populated\">\n                        \t\t<div class=\"elementor-element elementor-element-972d7b4 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"972d7b4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"565\" height=\"360\" src=\"https:\/\/vansinfotech.com\/Mellon1\/wp-content\/uploads\/2023\/06\/j9.png\" class=\"attachment-large size-large wp-image-6132\" alt=\"\" srcset=\"https:\/\/vansinfotech.com\/Mellon1\/wp-content\/uploads\/2023\/06\/j9.png 565w, https:\/\/vansinfotech.com\/Mellon1\/wp-content\/uploads\/2023\/06\/j9-300x191.png 300w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\n        <\/div>\n                            <\/div>\n        <\/section>\n                    <\/div>\n        <\/div>\n                            <\/div>\n        <\/section>\n        \t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>User Activity Monitoring User activity monitoring (UAM) solutions are software tools that monitor and track end user behavior on devices, networks, and other company-owned IT resources. Many organizations implement user activity monitoring tools to help detect and stop insider threats, whether unintentional or with malicious intent. The range of monitoring and methods utilized depends on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7148","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/pages\/7148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/comments?post=7148"}],"version-history":[{"count":7,"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/pages\/7148\/revisions"}],"predecessor-version":[{"id":7156,"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/pages\/7148\/revisions\/7156"}],"wp:attachment":[{"href":"https:\/\/vansinfotech.com\/Mellon1\/wp-json\/wp\/v2\/media?parent=7148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}