Veriato User Activity Monitoring (UAM) Features
Monitoring (8)
-
Interactions
Monitors interactions with customers and/or co-workers.
-
Web & Application Usage
Tracks usage across websites and desktop applications to provide visibility into user activity.
-
Mobile App Usage
Monitors mobile app usage.
-
Screenshots
Allows administrators to take screenshots of various devices at any time.
-
Web Blocking
Blocks websites deemed irrelevant or unproductive to company goals.
Screen Recording
Records video or screenshots of endpoint sessions.
Keystroke Logging
Logs keystrokes of users.
Sentiment Analysis
Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers.
Activity Monitoring - Employee Monitoring (4)
-
Calls
Logs phone calls, ensuring subject matter is relevant to company goals.
-
Email Activity Tracking
Captures email activity and metadata to provide visibility into communication patterns.
-
Social Media Activity Tracking
Tracks social media usage to provide insight into time spent across platforms.
-
Live Chat
Logs live chat conversations, ensuring subject matter is relevant to company goals.
Feedback (1)
-
Archives
Archives reports and logs for later reference.
Case Management (3)
-
Intake
Capture case information from multiple communication channels
-
Assignment
Deliver rules to assign cases based on type and priority
-
Escalation
Ability to escalate cases using workflows
Analytics (3)
-
Monitoring
Track all activities related to a case, including audit trails
-
Metrics
Provide metrics to track case progress or success rates
-
Compliance
Monitor various types of case compliance
Analysis (10)
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Data Context
Provide insights into why trends are occurring and what issues could be related.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Track Trends
Allows user to track log trends.
Detect Anomalies
Identify and predict anomalies in real-time with outlier detection and uncover root-causes
Metric and Event Data
Analyze both metric and event data on the same platform regardless of source or structure
Search
Search your logs for troubleshooting and open-ended exploration of your data
Alerts
Create alerts based on search patterns, thresholds for specific log metrics, or other conditions
Live Tail
See your data, in real time, streaming into the system from multiple data sources
Detection (3)
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Activity Monitoring
Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Data Preparation (4)
Data Sources
Automatically collect logs from all your services, applications, and platforms
Indexing
Automate the indexing of machine data that's critical to your operations
Automated Tagging
See log data in context with automated tagging and correlation
Data Blending
Mix and match data from apps, hosts, containers, services, networks, and more
Visualization (2)
Dashboards
Visualize log data on dashboards
Data Discovery
Drill down and explore data to discover new insights
Functionality (6)
Silent Deploy
Silently deploys on endpoints without alerting users.
Detect Data Movement
Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.
File and Application Activity
Tracks activities taken on files or in applications, including save, print, or delete actions.
Trigger Alerts
Sends alerts to administrators when users take insider threat actions .
Searchable Evidence
Maintains active and historical evidence in a searchable format.
Risk Scoring
Provides risk scoring for suspicious activity.
Generative AI (1)
-
AI Image-to-Text
Converts images into a textual description, identifying key elements.
Productivity Analytics - Employee Monitoring (4)
Project
Tracks productivity by task or project to analyze efficiency.
Hours
Identify most and least productive hours for individual or multiple workers.
Intelligence
Analyzes key metrics to identify root causes of productivity blockers or enhancers.
Burnout Indicators
Identifies patterns such as disengagement or irregular activity that may indicate burnout risk.
Agentic AI - User and Entity Behavior Analytics (UEBA) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Investigation Management (2)
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Log Analysis (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives


