Syteca Knowledge Base of End-User Documentation
As a comprehensive cybersecurity platform, Syteca (formerly Ekran System) is specifically designed to secure your organization from insider risks. By offering Privileged Access Management (PAM), User Activity Monitoring (UAM), and other security capabilities in a single platform, Syteca protects your internal perimeter and valuable assets against cybersecurity threats.
Syteca’s feature-rich and customizable toolset includes, but is not limited to, the following capabilities:
- Manage access permissions and verify user identities with Two-Factor Authentication (2FA) to prevent unauthorized access to your critical endpoints.
- Monitor and record the activity of your employees and third parties to see how they interact with your sensitive assets, and investigate security incidents.
- Leverage Password Management (PAM) to ensure secure creation, storage, and sharing of secrets for privileged user access, with this password vaulting solution that includes Privileged Account and Session Management (PASM), Workforce Password Management (WPM), Password Checkout, File Transfer, Remote Password Rotation, and other powerful features.
- Use Account Discovery (PAM) to detect high-risk and overlooked privileged accounts by automated scanning of your network, and manage them with precision.
- Receive real-time notifications about suspicious user behavior to keep your security team ahead of threats.
- Configure automated incident response to promptly kill suspicious processes and block users violating security policies.
- Generate custom reports to get more details on employee activity and support security audits.
Manage privileges dynamically, convert user activities into actionable insights, and respond swiftly to potential threats. Transform your organization's human risk into human assets.
Product Documentation
Welcome to the knowledge base of technical end-user documentation for Syteca!
This online documentation, aimed at assisting both new and existing users of the product, includes such valuable resources as:
- System Requirements: Hardware and software requirements for various deployment sizes and all components of Syteca including the Application Server, database, and Clients.
- Getting Started: How to rapidly get started, including installing, configuring, setting up, and using Syteca.
- NEW! Getting Started with SaaS: How to get started with a cloud-based SaaS deployment of Syteca.
- Deployment (Installation Checklist and Quick Start Guide): Detailed information on how to install, configure and maintain Syteca, and manage the interactions between its various component parts.
- Updating Syteca (Checklist & Best Practice): A step-by-step guide on how to prepare for and update all components of Syteca to a new version.
- Getting Started with Password Management (PAM): How to configure the Syteca Connection Manager and add secrets to connect to secure privileged accounts.
- Full User Manual: As the complete library of detailed information for users of Syteca, this full user guide contains all information on deploying, configuring, setting up, integrating, maintaining, managing and using the system, and includes the documents listed above, as well as much more.
- Syteca Encryption: A description of the different types of data encryption provided by Syteca.
- Syteca Features: Check out the full list of wide-ranging and often unique functionality offered by Syteca, along with a Full Feature Presentation of the product.
Release Notes
See what's new, in the latest Release Notes.
You can also download the latest version of Syteca on our website.
Online Demo & Free Trial
Request an online demo or 30–day trial of Syteca on our website.
Recently Updated
-
Logging into a Client Computer Requiring Administrator Approval on Login25 minutes ago • contributed by @a user
-
Removing Access Restrictions Requiring Administrator Approval on Login26 minutes ago • contributed by @a user
-
Editing Access Restrictions Requiring Administrator Approval on Login26 minutes ago • contributed by @a user
-
Adding Users with Access Restrictions Requiring Administrator Approval on Login26 minutes ago • contributed by @a user
-
The Client Uninstallation Key (for macOS Clients)28 minutes ago • contributed by @a user
-
The Client Uninstallation Key (for Windows Clients)28 minutes ago • contributed by @a user
-
Removing Access Restrictions Only at Specific Times30 minutes ago • contributed by @a user
-
Editing Access Restrictions Only at Specific Times30 minutes ago • contributed by @a user
-
Adding Users With Access Restrictions Only at Specific Times30 minutes ago • contributed by @a user
-
Introductionabout an hour ago • contributed by @a user
Frequently Asked Questions
Need More Help?
- Contact our Support Team. Our specialists will get back to you ASAP.
Other Resources
- Want to learn more? Find more articles on our website Blog.