際際滷

際際滷Share a Scribd company logo
What will activity monitoring be like in 100 years?
THE SHORT WAY 
Including far-future aliens and other bad-ass characters 
(Video on next slide)
ACTIVITY MONITORING? 
Activity monitoring = the aggregation, analysis, and presentation 
of real-time information about activities inside organizations and 
involving customers and partners. 
Phew.
ACTIVITY MONITORING? 
In our words: 
A centralized authentication and access-control point in your IT environment: 
It improves security and reduces user administration costs. 
It helps you to control who can access what and when on your servers. 
It perfectly isolates your sensitive systems from unknown intruders or from non-authorized 
users. 
It tracks all authorized access to sensitive data and provides you with actionable 
information in the case of human errors or unusual behavior.
IN THE NEWS 
Hackers 
Every day, there is more data to be hacked (big data). The Internet is like a candy 
store that expands every day with the most yummy candy you can find in the whole 
wide world. Like children are attracted to candy, hackers are attracted to big data. 
Internal staff 
Yes, we need to spy on them, but its for your own good. If you dont, one day or 
another, your sensitive data will be out there. People will love it, you not so much.
OUR FUTURE VISION 
ON ACTIVITY MONITORING 
Without far-future aliens, but with other bad-ass characters 
2100 
We will get an alert when someone tries to steal our information, inside our outside 
the company, when someone tries to download a secured document or when the 
system tracks unusual behavior. And the aliens? Well, lets hope theyll work together 
with us.
Metastore creates custom-made solutions, in 
partnership with the best software vendors in the 
world. If you want to see for yourself what we 
have to offer, contact us for a talk today. 
metastore.eu

More Related Content

What will activity monitoring be like in 100 years?

  • 2. THE SHORT WAY Including far-future aliens and other bad-ass characters (Video on next slide)
  • 3. ACTIVITY MONITORING? Activity monitoring = the aggregation, analysis, and presentation of real-time information about activities inside organizations and involving customers and partners. Phew.
  • 4. ACTIVITY MONITORING? In our words: A centralized authentication and access-control point in your IT environment: It improves security and reduces user administration costs. It helps you to control who can access what and when on your servers. It perfectly isolates your sensitive systems from unknown intruders or from non-authorized users. It tracks all authorized access to sensitive data and provides you with actionable information in the case of human errors or unusual behavior.
  • 5. IN THE NEWS Hackers Every day, there is more data to be hacked (big data). The Internet is like a candy store that expands every day with the most yummy candy you can find in the whole wide world. Like children are attracted to candy, hackers are attracted to big data. Internal staff Yes, we need to spy on them, but its for your own good. If you dont, one day or another, your sensitive data will be out there. People will love it, you not so much.
  • 6. OUR FUTURE VISION ON ACTIVITY MONITORING Without far-future aliens, but with other bad-ass characters 2100 We will get an alert when someone tries to steal our information, inside our outside the company, when someone tries to download a secured document or when the system tracks unusual behavior. And the aliens? Well, lets hope theyll work together with us.
  • 7. Metastore creates custom-made solutions, in partnership with the best software vendors in the world. If you want to see for yourself what we have to offer, contact us for a talk today. metastore.eu