On-Screen Trail solution, Operation Log Trail, Real Time Monitoring

Illegal View

IT Fraud Monitoring, Cyber-Attack Defense, Endpoint Security
Privileged ID Solution

SPIDER

Special ID Manager - SPIDER

Illegal View

Feature

Illegal View can be said as on-screen activity trail solution, operation trail solution. and end-point security solution. User can best utilize Illegal View for the following situations; -Prevention of fraudulent operation of IT system/ -Audit trail and non-fraud evidence /-Real-time monitoring/ -End-point security solution against cyber-attack /-Training utilizing recorded on-screen picture / -Work style reform

Learn More

Functionality and System Requirement

Illegal View functionality list and system requirement show that Illegal View provides you with perfect audit trail and non-fraud evidence. Besides, it protects your IT system from internal fraud, cyber-attack. Please review more.

Learn More

Collaboration

Nowadays, many companies deploy SIEM solutions to protect its own IT infrastructure and detect potentially malicious data. Illegal View, with its command prompt function, allows you to realize smooth linkage between the two software as if it were one. Illegal View is now authorized by Hitachi Corporation as certified linkage product for JP1/ Navigation platform.

Learn More

SPIDER

Feature

SPIDER is developed only with KDTS's proprietary technology. It is a unique agentless monitoring solution for privileged ID user and regular ID user activity. SPIDER manages activity monitoring via WEB and therefore, it has a minimum network load. SPIDER can be applicable for not only Windows environment but also Linux. Furthermore, it works in thin client environment and VDI environment.

Learn More

Functionality and System Requirement

SPIDER feature and system requirement are listed here and you find all features necessary to manage privileged ID for your IT system's rightful operation.

Learn More

Collaboration

SPIDER manages ID user activity. With Illegal View linkage, you can record not only ID user activity but also activity contents with recorded on-screen image and various logs such as text, access record and others.

Learn More

Case Studies

A Company Case : IT related

A Company Case : IT related

Objective: Effective utilization of Amazon Web service over cloud computing. Illegal View server and Clients are deployed over Cloud computing and are able to record all on-screen data and operation data of both thin client terminals and regular terminals without fail.

Learn More

B Company Case: Call Center

B Company Case: Call Center

Objective: Quality enhancement of call center total operation skill and help desk operator work 1. To establish fair HR evaluation system for operators by eliminating biased and individualized evaluation by supervisors 2. To increase the number of operator managed by one supervisor

Learn More

C  Comany Case : Insurance business related

C Comany Case : Insurance business related

Objective: Customer information is protected 100% and no data leakage is to be ensured as company always has a high rate of employee turnover.

Learn More

D Company case : Financing business related

D Company case : Financing business related

Objective: Server Maintenance Activity Audit Company is obliged to assign monitoring person to witness and monitor the server maintenance work by third party contractor on site to ensure that the work is properly and rightfully conducted. It has incurred a lot of expense and manpower to do this monitoring.

Learn More

Products for Thailand Market

Products for Thailand Market

KDTS Co.,Ltd has developed 2 IT hardware products and launched in Thailand to support those Japanese companies who encounter insufficient network infrastructure problem. We believe that these 2 products can also be of great help not only in Thailand but also in other Southeast Asian countries who still have weak and insufficient internet infrastructure.

Learn More

What’s New

Release Information

Tips Blog