Could you stop an "Edward Snowden" on your network? Learn how to w. @WheelSystems

Video Summary: The concept is to record every network packet movement associated with your privlieged users so you can replay it at a later date. This is a Privileged Access Management (PAM) system that serves as a deterrent as well as a forensic tool….

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT