33 Syteca Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "Ekran System was deployed at several endpoints and servers within the organization, and the implementation of the agents was done quickly and efficiently. Immediately after deployment, we gained precise access control, as well as the monitoring and recording capabilities we wanted."

  • “We use Ekran System to record remote sessions of service technicians. We have several systems serviced by external companies. Thus, we have to monitor all their actions in our systems for accountable reasons. Provided solution is easy to use, yet robust, and meets our expectations.”

  • "With Syteca’s support team being available 24/7, deployment of and further work with the platform went smoothly and without any complications.”

  • "As a Managed Service Provider we are responsible for our customers' servers but aren't the only ones with access and often well intentioned 3rd parties cause disruption with unauthorised changes. Ekran gives us peace of mind that all actions carried out on the server are recorded and we can quickly identify & rectify issues. It's like having CCTV for your server and in these times of a need for heightened security and auditing this is perfect for the job. Our cloud based centralised management console makes it easy for us to monitor all our customers in one place, which is great for a MSP as we can quickly deploy this to customers with minimal, if any, changes to their network or infrastructure."

  • “Ekran System is a reliable product that meets its functions. We use it to monitor privileged activity on corporate servers because of maximal simplicity of the interface and the most integrated and easy to analyze format.”

  • “In order to comply with regulations and corporate policy rules, we wanted to ensure uninterruptible privileged user audit, as well as provide local and remote employee activity monitoring. That’s why we have chosen Ekran System, easy-to-use and affordable solution, which met our expectations in full measure.”

  • “Ekran System product completely meets our requirements. Its maintenance is intuitive, and configuration is easy and painless.”

  • "Ekran gives me confidence when working with external service providers, resolves concerns about using such services we had in the past. The system monitors suppliers and if there is any concern, I can track everything."

  • "In addition to Ekran System, we’ve examined other system solutions, but after comparing the different systems’ features and capabilities, the conclusion was very clear that Ekran System provides the most diverse and extensive platform and set of capabilities."

  • "Ekran System was the only solution that allowed us to monitor servers running different OSs and install critical updates offline. Getting the same monitoring functionality for a reasonable price was an unexpected benefit of this cooperation."

  • "The [Syteca] solution helped us gain full control over the activities of privileged users of third-party employees on selected servers and terminals."

  • "Ekran System greatly streamlines all work with vendors. With it, we can monitor and track the activity of anyone who connects to the network at any time. Of course, it also contributes greatly to the whole issue of information security."

  • "Ekran System offers features that best align with our needs and challenges. It easily integrates with our existing systems and ensures uninterrupted operation. Ekran System's data archiving and data recovery are also beneficial. Additionally, it has Ukrainian localization, for which we are particularly appreciative."

  • "Ekran System provides a great solution that protects sensitive data and improves productivity where required. The software records sessions which gives us full context and visibility of IT infrastructure and provides us with added protection. The user activity reports also are very helpful and enhance security and productivity."

  • "As the organization's activity increased, so did the number of vendors that needed to connect to the network, and managing the allocation of users and passwords became more complicated and time-consuming than managing the computer system. In addition, we had no ability to monitor what each provider was doing on the network and make sure they weren’t connecting to servers they were not authorized to connect to or performing operations they weren’t authorized to perform. The inability to monitor and document these actions reduced the level of information security and increased the risk of data breach incidents."