{"id":562,"date":"2022-04-08T20:13:25","date_gmt":"2022-04-08T16:13:25","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=562"},"modified":"2022-05-24T21:05:50","modified_gmt":"2022-05-24T17:05:50","slug":"user-activity-monitoring","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/user-activity-monitoring\/","title":{"rendered":"User Activity Monitoring"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411930098{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\">User Activity Monitor<\/h1>\n<p>User activity monitoring is the process of tracking all user activity and behavior, while they are logged into a computer (endpoint). With an employee monitoring solution in place, businesses have the necessary means to keep an eye on their sensitive data, employees and third-party entities so that they can identify and stop the misuse of company data and resources[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;653&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411947882{padding-top: 20px !important;padding-bottom: 50px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;View More&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; el_class=&#8221;buttonwebsite&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Fekran%2F|title:Ekran|target:_blank&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411930098{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text] User Activity Monitor User activity monitoring is the process of tracking all user activity and behavior, while they are logged into a&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-562","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":11,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/562\/revisions"}],"predecessor-version":[{"id":1243,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/562\/revisions\/1243"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}