{"id":460,"date":"2022-04-07T19:52:19","date_gmt":"2022-04-07T15:52:19","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=460"},"modified":"2022-05-25T20:00:53","modified_gmt":"2022-05-25T16:00:53","slug":"ekran","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/ekran\/","title":{"rendered":"Ekran"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653494385880{padding-top: 25px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;653&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1649187693627{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\"><strong>Insider Threat Protection and User Activity Monitoring<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]Ekran System offers clients for all popular operating systems and supports virtual environments as well as any network architecture. You don\u2019t have to choose between agent-based and jump server schemes: we support any hybrid enterprise architecture.<\/p>\n<p>Ekran System is easy to implement in large-scale environments due to its high availability, multi-tenancy, and ability to fill the gaps of existing security solutions. Ekran provides enterprise-oriented features such as system resource and health monitoring dashboards and scheduling of automated maintenance tasks.[\/vc_column_text][vc_column_text]A perpetual licensing model provides you with the latest version of Ekran System. Floating endpoint licensing enables license reassignment in a couple of clicks. For virtual environments, this process is automated to enhance your organization\u2019s agility.[\/vc_column_text][vc_btn title=&#8221;View Website&#8221; size=&#8221;lg&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; el_class=&#8221;buttonwebsite&#8221; link=&#8221;url:https%3A%2F%2Fwww.ekransystem.com%2Fen%2Fproduct%2Fuser-activity-monitoring&#8221;][\/vc_column][vc_column css_animation=&#8221;fadeInRight&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/iNjOvilDyVg\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>[\/vc_column_text][\/vc_column][\/vc_row][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1652288469878{margin-top: 20px !important;padding-top: 40px !important;padding-bottom: 30px !important;}&#8221; el_class=&#8221;ekranmid&#8221;][vc_row css=&#8221;.vc_custom_1652288276176{padding-top: 0px !important;padding-bottom: 30px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1653494439519{padding-top: 80px !important;padding-right: 20px !important;padding-bottom: 80px !important;padding-left: 20px !important;background-color: #ededed !important;}&#8221;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><strong>Manage Insider Threats<\/strong><\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4 class=\"i-pr-text\" style=\"text-align: center;\">M<\/h4>\n<p style=\"text-align: center;\"><strong>Average annual cost of insider threats<\/strong><\/p>\n<p style=\"text-align: center;\">according to 2020 Cost of Insider Threats: Global Organizations report by the Ponemon Institute<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4 class=\"i-pr-text\" style=\"text-align: center;\">30%<\/h4>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Share of insider-driven data breaches<\/strong><\/span><\/p>\n<p style=\"text-align: center;\">according to the 2020 Data Breach Investigations Report from Verizon<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column css_animation=&#8221;fadeInRight&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1653494449145{padding-top: 80px !important;padding-right: 20px !important;padding-bottom: 109px !important;padding-left: 20px !important;background-color: #c1bcbc !important;}&#8221;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><strong>Meet Compliance Requirements<\/strong><\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4 class=\"i-pr-text\" style=\"text-align: center;\">M<\/h4>\n<p style=\"text-align: center;\"><strong>Financial institutions were fined for data privacy breaches and violations in 2019<\/strong><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4 class=\"i-pr-text\" style=\"text-align: center;\">48%<\/h4>\n<p style=\"text-align: center;\"><strong>Share of breaches involving internal actors in healthcare organizations<\/strong><\/p>\n<p style=\"text-align: center;\">according to the 2020 Data Breach Investigations Report from Verizon<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653494385880{padding-top: 25px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;653&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1649187693627{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243;][vc_column_text] Insider Threat Protection and User Activity Monitoring [\/vc_column_text][vc_column_text]Ekran&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-460","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":34,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/460\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/460\/revisions\/1258"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}