- Use Cases
Firewalls are typically used to prevent hackers, or malicious actors from accessing your internal network. In addition, they are also utilized to filter Internet access to unapproved websites from within the internal network; however, that is not always the case when the machine is taken off the network. While they are able to see network traffic traversing the perimeter via firewall logs, and are likely to block website access, a perimeter firewall is unable to see the context of activities or any activity that is occurring solely within the network, leaving your educational institution vulnerable.
For example, firewalls are not able to record documents being transferred to USB drives or cloud storage. Firewalls also cannot monitor keystrokes to detect potentially harmful keywords that could be associated with cyber bullying, drugs, violence, inappropriate conduct, and other questionable content.
Veriato can record all of these activities, and more, while providing screen snapshots, much like a CCTV camera, allowing you to see everything that was displayed on the end user’s monitor(s).
Possible examples of how firewalls can fall short on protection:
Firewalls therefore do not provide sufficient protection for a multitude of vulnerabilities within your network. User Activity monitoring fills these gaps by continuously monitoring users for signs of risk