Veriato Recon Features

User Activity Log

Veriato Recon captures and stores the user activity analyzed for a period of time, providing the ability to unlock and quickly review the activity data should an investigation be required.
User Activity Log

The software logs online and communications activity based on your configuration, and levers a unique distributed storage architecture to keep your data secure and available without requiring significant centralized storage and the associated expense.

The software captures application usage, resource access, data movement, network activity – even screenshots to ensure you have a complete picture of exactly what occurred prior to, during, and immediately after an anomaly is detected – cutting down on the resources needed to efficiently and accurately review and respond to an incident