Data is power. But modern cybersecurity solutions collect too much data for humans to analyze it and get actionable insights. Real-time dashboards, security alerts, and user session records help you detect and stop any suspicious activity. And with business intelligence, you can see a high-level picture of the state of your cybersecurity.
Microsoft Power BI analyzes and structures data arrays collected by other software. When integrated with Ekran System, Power BI can easily export and visualize data on employees’ idle and work time as well as productivity; it can also provide you with insights on common applications and URLs that your employees access.
Such business intelligence allows you to detect long-lasting issues with employee productivity and indicators of possible security violations.
To help you import monitoring data into Microsoft Power BI, we enabled the Ekran System Data Connector to create a data pipeline between the two solutions. You only need to add the Ekran System API key and endpoint name to Microsoft Power BI and specify the time period for the data you want to analyze.
After a couple of clicks, you’ll have three custom business intelligence reports that will be updated with new data automatically. Our integration allows you to use Microsoft BI’s flexibility and configure these reports however you want — the needed data is all there.
This report helps you assess how much time your users spend actually working when their endpoint is active. While having some idle time during the workday is expected, a long period of inactivity may indicate productivity issues that you can help to resolve.
Ekran System starts counting idle time if a user is inactive for more than 15 minutes. You can filter data on idle and work time by dates, date ranges, and specific users. This allows you to compare records between peer groups and discover anomalies. Also, you can add any custom configurations that Microsoft PowerBI provides.
Visualizing the total time users spend on particular applications and URLs allows you to see what your users do during the day. With the report on Common applications and URLs, you can detect and collect evidence on users who slack off at work or violate security policies by accessing banned applications and websites. Another way to use this report is to see which apps and URLs have slipped through your security policies and should be banned.
This report provides you with general information on popular apps and websites as well as browsers, dates, and users.
This report visualizes your users' productivity: usual work hours, idle time, and peak activity periods. It can provide insights into user productivity, possibilities for its improvement, and suspicious activity. For example, you can notice that some of your users connect to the network at odd hours, which is one possible indicator of an insider threat.
In this report, you’ll see all the active time of your users, specific groups, or a particular individual. Combined with data from Common applications and URLs tab, you can determine whether an employee was busy with work-related tasks or you need to investigate their activities further.
Ekran System employee tracking software seamlessly integrates with your infrastructure, including with leading SIEM and ticketing systems.