{"id":13525,"date":"2023-04-24T06:57:52","date_gmt":"2023-04-24T13:57:52","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=13525"},"modified":"2026-01-29T02:30:18","modified_gmt":"2026-01-29T09:30:18","slug":"alerts-and-notifications","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications","title":{"rendered":"User Activity Monitoring Alerts and Notifications"},"content":{"rendered":"\n\t\t<div  class=\"block-71865b50-27eb-40f6-ac68-3a4a5391f109 areoi-element overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f33f01b3-a5ec-4163-9718-9acdc02840cb areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-center\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11205211\/hero-bg-scaled.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-bf25130c-56ce-4e4c-b367-343fbf2880de row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-ae4a9496-c635-4416-a7d8-5109b209fed2 col areoi-element px-3 px-md-5 m-auto col-12 col-xl-8\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4 h1-new-design has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Real-time User Activity Alerts and Incident Response<\/h1>\n\n\n\n<p class=\"has-text-align-center mb-0 mx-auto text-22-16 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Detect threats. Receive alerts. Respond to incidents.<\/p>\n\n\n\n\t\t<div  class=\"block-3ea0e91e-bac8-403a-a13e-a854b0c693f9 areoi-element new-design d-flex justify-content-center align-self-center  flex-wrap button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-de3b11c2-c778-48a0-a657-1e43ada50480 btn areoi-has-url position-relative hsBtn-demo btn-primary me-md-1 mb-1 mb-md-0 btn-primary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-ca5e3a61-7bd8-407c-8af3-cc889cf46dbc btn areoi-has-url position-relative btn btn-outline-light ms-md-4 mt-3 mt-md-0 btn-outline-light\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7bf8da65-0afa-4377-8809-97c623955de7 areoi-element nav-page-sticky nav-page d-flex flex-row justify-content-lg-center align-items-center radial-grad-bg\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#benefits\">Benefits<\/a><\/p>\n\n\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#alerts\">Alerts<\/a><\/p>\n\n\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#incident-response\">Incident response<\/a><\/p>\n\n\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#investigation\">Investigation<\/a><\/p>\n\n\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#how-it-works\">How it works<\/a><\/p>\n\n\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"#faq\">FAQ<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"background:linear-gradient(180deg, #FFF 0%, #D9E4FE 100%)\"  class=\"block-a9dac4a9-c67f-4f66-bafe-9488d97fc5ee areoi-element new-design section-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"benefits\" class=\"block-296abbef-6932-4225-9141-c1b360a9e0d9 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7c504e2f-26f2-4967-819d-91e30c0c371a areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design mb-3 mb-md-4\">From detection to investigation, Syteca has got you covered<\/h3>\n\n\n\n<p class=\"has-text-align-center mb-0 text-20-16\" style=\"font-style:normal;font-weight:500\">With a flexible rule-based system, automated response functionality, and comprehensive user activity monitoring, Syteca empowers you to quickly detect internal cybersecurity threats, respond to them, and investigate the root causes.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-40c34c52-b39d-4a17-8672-00a4eb57697e row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-6596a451-e3df-460b-af12-0a3815d6a67b col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c5e6d385-9329-449f-93f3-46d97f0a07a4 areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210244\/ring-bell.svg\" alt=\"\" class=\"wp-image-59482\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Get notified of suspicious activity in real time<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ed67eed4-b598-4063-824f-91dcd5e50d70 col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-374d306a-72da-4969-ae60-b6288b8920dd areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210314\/threat-detect.svg\" alt=\"\" class=\"wp-image-59489\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Identify and disrupt cybersecurity threats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b23e9f34-c29d-4444-b72a-be61812ed6dd col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a375ed35-2f5b-4562-aeba-31abf740a2da areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210334\/shield-check.svg\" alt=\"\" class=\"wp-image-59496\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Investigate cybersecurity incidents<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5f2fdf0c-651d-4308-ae40-29f09a5cc68d col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4e4b7a36-b979-4c4f-aa1a-98809cb5a514 areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210355\/update.svg\" alt=\"\" class=\"wp-image-59503\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Ensure business continuity<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-979c4f0c-d176-49f5-bcce-51f661d8ea43 col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-80948b4c-3023-4ad3-a197-8baf2f90209a areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210418\/user-check.svg\" alt=\"\" class=\"wp-image-59510\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Minimize the impact of insider threat incidents<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-92051601-9807-445d-944a-ffc26f8fa080 col areoi-element col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e4f436e4-8b62-44c9-8b77-407bcaf2377b areoi-element rounded-bg-20px h-100 d-flex align-items-center d-md-block\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-md-4\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210443\/compliance.svg\" alt=\"\" class=\"wp-image-59517\"\/><\/figure>\n\n\n\n<p class=\"p-poppins text-22-18 mb-0 ms-4 ms-md-0\" style=\"font-style:normal;font-weight:600\">Meet IT compliance requirements<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"background:linear-gradient(180deg, #0C1B33 0%, #281C36 100%)\"  class=\"block-c9d0c76f-d362-424d-aafd-2956bc46d448 areoi-element section-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"alerts\" class=\"block-b08c43ed-5f38-4b77-91ca-022cde1b1ec0 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-194f8972-e5be-494b-8be2-b4da28171d6e areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design mb-3 mb-md-4 has-text-color has-link-color wp-elements-b8a9648e5439e05ea207700b8dde8a24\" style=\"color:#ffffff\">Stay on top of user actions with a rule-based activity alert system<\/h3>\n\n\n\n<p class=\"has-text-align-center text-20-16 mb-0 has-text-color has-link-color wp-elements-6c5521de185436d9c6f1713cd9b5759f\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Syteca\u2019s alerting and incident response functionality incorporates a system of granular alert rules. Once an event meets the rule conditions, the system <strong>notifies<\/strong> your security officers or automatically <strong>responds<\/strong> to the event. Syteca\u2019s cybersecurity incident alert management and response system offers:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-06fd14c2-b0e6-4885-9639-0320a53abc2b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28d3dd82-3a45-4d6a-bc3c-4c1a891d2783 col areoi-element mb-3 mb-xl-0 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5c0ec127-1fa4-42dd-b025-3565da8890ea areoi-element rounded-bg-12px text-xl-center h-100 d-md-flex align-items-center flex-xl-column\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-4 mb-md-0 mb-xl-4\"><img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210807\/bell.svg\" alt=\"\" class=\"wp-image-59524\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-a634b128-70c4-4886-91e8-3443496dc461 areoi-element ms-md-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-28-22 mb-2 mb-xl-3\" style=\"font-style:normal;font-weight:500\">Predefined alerts<\/p>\n\n\n\n<p class=\"mb-0\">Use alert templates to detect common cybersecurity threats such as fraud, data leaks, or other insider actions.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a4010d84-5b55-4dbc-96b4-7f6a2a998832 col areoi-element col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-19eced98-b069-4371-bd8a-76755f44d71a areoi-element rounded-bg-12px text-xl-center h-100 d-md-flex align-items-center flex-xl-column\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-4 mb-md-0 mb-xl-4\"><img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11210843\/custom-alert.svg\" alt=\"\" class=\"wp-image-59531\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-c7183822-4ec9-4b94-a6e9-84a9d5efa84d areoi-element ms-md-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-28-22 mb-2 mb-xl-3\" style=\"font-style:normal;font-weight:500\">Custom alerts<\/p>\n\n\n\n<p class=\"mb-0\">Create your own alerts for unique scenarios, for instance, if a user opens a specific app, visits a particular URL, or types certain words.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c930ee0d-183d-45eb-ae81-6a350d252ec3 areoi-element section-5\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"incident-response\" class=\"block-d115f67c-68fe-4d53-bc1d-66e1c35e1d38 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center mb-3 mb-md-4 h3-new-design\">Respond to incidents in a timely manner<\/h3>\n\n\n\n<p class=\"has-text-align-center text-20-16 mb-0\" style=\"font-style:normal;font-weight:500\">When a security event is detected, Syteca facilitates a quick <strong>manual<\/strong> response or <strong>automatically<\/strong> blocks the user or process. You can configure different types of responses for different incidents:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7b2134f7-be02-4a03-874f-774af9e049fb areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-21b3fa4f-8928-4d6e-ad4d-5a461a1c7678 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-e0641ffb-deb2-4dda-b809-bfef6d3bf97c col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-72f64658-30a7-481c-bf16-4d244525abf6 areoi-element d-flex align-items-center flex-xl-wrap\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-xl-4\" style=\"min-width:3rem;\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211402\/incident-response.svg\" alt=\"\" class=\"wp-image-59538\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-3bdc3d4e-1785-4fdf-acaf-f0e0958f4374 areoi-element ms-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.38rem;font-style:normal;font-weight:600\">Inform you with a notification<\/p>\n\n\n\n<p class=\"mb-0\">After receiving a notification, you can replay the user session to analyze context and respond quickly if a threat is detected.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-179bfe58-f548-455c-a8ed-a73bf65fe2aa col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-97e8ecb2-0f5b-43e9-a885-491e91cf8f57 areoi-element d-flex align-items-center flex-xl-wrap\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-xl-4\" style=\"min-width:3rem;\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211411\/user-block.svg\" alt=\"\" class=\"wp-image-59545\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-3bdc3d4e-1785-4fdf-acaf-f0e0958f4374 areoi-element ms-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.38rem;font-style:normal;font-weight:600\">Block the user<\/p>\n\n\n\n<p class=\"mb-0\">Block a user manually, or configure the system to automatically log the user out of their session when suspicious activity is detected.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9029dd91-00a4-465f-a1b2-5727d1324768 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a51bfc04-e124-41bd-9283-a2df20ab96f0 areoi-element d-flex align-items-center flex-xl-wrap\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-xl-4\" style=\"min-width:3rem;\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211419\/block.svg\" alt=\"\" class=\"wp-image-59552\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-3bdc3d4e-1785-4fdf-acaf-f0e0958f4374 areoi-element ms-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.38rem;font-style:normal;font-weight:600\">Kill processes<\/p>\n\n\n\n<p class=\"mb-0\">Syteca can forcibly terminate application processes to prevent them from being used for malicious activity.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4d560fb7-6253-481e-a194-9e2990563c66 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9504864b-b6d9-4bae-b246-8cc6bd98b00a areoi-element d-flex align-items-center flex-xl-wrap\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-xl-4\" style=\"min-width:3rem;\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211436\/alert.svg\" alt=\"\" class=\"wp-image-59566\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-3bdc3d4e-1785-4fdf-acaf-f0e0958f4374 areoi-element ms-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.38rem;font-style:normal;font-weight:600\">Display a warning message to the user<\/p>\n\n\n\n<p class=\"mb-0\">Activate this feature to display a message when a user violates your policies or performs a suspicious action.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9fe6f345-8077-4881-be4c-3f0bac33eb93 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-80eef21d-df41-4359-82ef-5003aaa6515c areoi-element d-flex align-items-center flex-xl-wrap\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full mb-xl-4\" style=\"min-width:3rem;\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211445\/usb.svg\" alt=\"\" class=\"wp-image-59573\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-3bdc3d4e-1785-4fdf-acaf-f0e0958f4374 areoi-element ms-4 ms-xl-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.38rem;font-style:normal;font-weight:600\">Block USB devices<\/p>\n\n\n\n<p class=\"mb-0\">When a user inserts an unauthorized USB device, Syteca can block it and notify security officers about the event.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"background:linear-gradient(180deg, #0C1B33 0%, #0D1E5C 100%)\"  class=\"block-46f0c996-8439-4db7-88e1-3b442346f839 areoi-element section-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"investigation\" class=\"block-629975d5-9a35-4bb9-8861-cf50e47bf037 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center mb-4 h3-new-design has-text-color has-link-color wp-elements-ffa127a999a025fa112fd6cba155039e\" style=\"color:#ffffff\">View security events with convenience<\/h3>\n\n\n\n<p class=\"has-text-align-center mb-0 text-20-16 has-text-color has-link-color wp-elements-846d73230848fa18b9b00fb85d4ffeb1\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Syteca offers a flexible alert viewing and investigation experience:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8072b010-0364-4515-b7bc-912c4f69ec06 areoi-element container home-accordion-with-image accordion-with-image-1 rounded-bg-20px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-7197fa8a-2a53-4c3a-b2f9-b42d51835935 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-78a6b30d-4b99-4183-97eb-c5c759d4dcaa col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e9e6b69e-4ee1-4190-ab0f-3f012810f521 accordion home-accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-e60be158-7315-4b82-af73-094a1b57ee30 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-e60be158-7315-4b82-af73-094a1b57ee30-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAlerts tab\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-e60be158-7315-4b82-af73-094a1b57ee30-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-e60be158-7315-4b82-af73-094a1b57ee30-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p class=\"with-link\">View all alert events in your system. Filter records by risk level, a specific user, active applications, and other criteria.<\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center fancybox-click-img\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"960\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211905\/graphics-2.png\" alt=\"\" class=\"wp-image-59587\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211905\/graphics-2.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211905\/graphics-2-300x229.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211905\/graphics-2-1024x780.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211905\/graphics-2-768x585.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAlert reports\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d5294691-4219-47ff-98ac-e02a5d9950b7-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p class=\"with-link\">Generate informative reports containing details on all monitoring alerts triggered during a specified period.<\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center fancybox-click-img\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"960\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211820\/graphics-1.png\" alt=\"\" class=\"wp-image-59580\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211820\/graphics-1.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211820\/graphics-1-300x229.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211820\/graphics-1-1024x780.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211820\/graphics-1-768x585.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0545d6c-53e7-4daf-be46-74c336632640 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d0545d6c-53e7-4daf-be46-74c336632640-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\"\n\t\t\t\t>\n\t\t\t\t\tMicrosoft Power BI integration\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d0545d6c-53e7-4daf-be46-74c336632640-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d0545d6c-53e7-4daf-be46-74c336632640-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Send your data to Microsoft Power BI and generate interactive reports on alerts to identify signs of security violations at a glance.<\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center fancybox-click-img\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"960\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211932\/graphics-3.png\" alt=\"\" class=\"wp-image-59594\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211932\/graphics-3.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211932\/graphics-3-300x229.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211932\/graphics-3-1024x780.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211932\/graphics-3-768x585.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3 accordion-item\">\n\n\t\t\t<h4 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\"\n\t\t\t\t>\n\t\t\t\t\tTop Alerts dashboard\n\t\t\t\t<\/button>\n\t\t\t<\/h4>\n\n\t\t\t<div \n\t\t\t\tid=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-eac331c4-85f0-4b96-be7f-533508bae7c3-header\"\n\t\t\t\tdata-bs-parent=\".block-e9e6b69e-4ee1-4190-ab0f-3f012810f521\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p class=\"with-link\">Easily analyze security events and alert risk levels at a glance in the Top Alerts dashboard.<\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center fancybox-click-img\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1260\" height=\"960\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211959\/graphics-4.png\" alt=\"\" class=\"wp-image-59601\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211959\/graphics-4.png 1260w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211959\/graphics-4-300x229.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211959\/graphics-4-1024x780.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11211959\/graphics-4-768x585.png 768w\" sizes=\"(max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a073b712-cd45-4800-a1a4-50c713105e6e col areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a6843be8-b6ef-4e75-8ed9-cd71db619166 areoi-element\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"background:linear-gradient(273deg, #552C58 0.58%, #1A3287 99.24%)\"  class=\"block-a9e1f0e7-48b6-4d4c-9016-6516d5058fb9 areoi-element container block-cta\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center d-none d-xl-block mb-0 mx-auto text-28-22-18 p-poppins has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Spot insider threats instantly, respond automatically, <br>and stay ahead of risk with Syteca<\/p>\n\n\n\n<p class=\"has-text-align-center d-xl-none mb-0 mx-auto text-28-22-18 p-poppins has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Syteca\u2019s incident alert management solution allows you to customize the way you analyze, audit, and cross-check user activity within your environment and set up automated incident response actions.<\/p>\n\n\n\n\t\t<div  class=\"block-5f792669-bbe7-49f0-95f1-6c44d42a9152 areoi-element new-design d-flex justify-content-center align-self-center  flex-wrap button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-de3b11c2-c778-48a0-a657-1e43ada50480 btn areoi-has-url position-relative hsBtn-demo btn-primary me-md-1 mb-3 mb-md-0 btn-primary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-ca5e3a61-7bd8-407c-8af3-cc889cf46dbc btn areoi-has-url position-relative btn btn-outline-light ms-md-4 btn-outline-light\"\n\t href=\"\/en\/pricing\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tRequest Pricing \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"background:linear-gradient(180deg, rgba(65, 124, 250, 0.00) 0%, rgba(65, 124, 250, 0.20) 100%), #FFF\"  class=\"block-c203fb4e-81b8-4ebf-b912-aad685ebe633 areoi-element section-7\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"how-it-works\" class=\"block-e5032419-a80b-4d6d-9352-31930d6cd84d areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-37e1caf5-4741-43b6-a2e7-c9fa85096f95 areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design mb-3 mb-md-4\">How Syteca&#8217;s incident response feature works<\/h3>\n\n\n\n<p class=\"has-text-align-center text-20-16\" style=\"font-style:normal;font-weight:500\">Check out three common scenarios where Syteca\u2019s alerting and incident response capabilities can facilitate efficient intervention measures:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div id=\"accordion\" class=\"block-be08623f-a71d-4252-b042-0db66da6d05a row areoi-element benefits-extended  animated-cards\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-3eb6ccf2-0b9e-4008-8e83-e2d060297bb1 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-24e45d35-fd9f-4d6d-9472-d56c1ae68d1a areoi-element p-poppins h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(2, 226, 168,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-633c0642-14a3-488e-9126-215888acd967 areoi-element d-flex flex-row flex-xl-row-reverse align-items-center pb-xl-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"text-28-22 mb-0 me-4 me-xl-0 has-text-color\" style=\"color:#10ce9e;font-style:normal;font-weight:600\">01<\/p>\n\n\n\n<p class=\"collapsed mb-0 ms-0 flex-grow-1 text-22-18 has-text-color\" style=\"color:#10ce9e;font-style:normal;font-weight:600\"><a class=\"collapsed\" data-bs-target=\"#prevent\" data-bs-toggle=\"collapse\" href=\"#prevent\">Preventing a possible data leak<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"prevent\" class=\"block-10f085d3-d9ee-406a-abf5-ff2fa61d95be areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide opacity-25 my-4 d-xl-none\" style=\"background-color:#3a62f2;color:#3a62f2\"\/>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">One of your privileged users with access to sensitive data uploads a file through a web browser.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">A corresponding predefined alert is triggered.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">The user sees a warning message, and security officers receive a notification allowing them to promptly review the event.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2a51b14d-fd96-4e79-bf9a-56e838b51dca col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-821f2131-2dcd-4b3b-a4ea-0b0d95d51d45 areoi-element p-poppins h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(253, 77, 87,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-633c0642-14a3-488e-9126-215888acd967 areoi-element d-flex flex-row flex-xl-row-reverse align-items-center pb-xl-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"text-28-22 mb-0 me-4 me-xl-0 has-text-color\" style=\"color:#e74650;font-style:normal;font-weight:600\">02<\/p>\n\n\n\n<p class=\"collapsed mb-0 ms-0 flex-grow-1 text-22-18 pe-xl-5 has-text-color\" style=\"color:#e74650;font-style:normal;font-weight:600\"><a class=\"collapsed\" data-bs-target=\"#investigate\" data-bs-toggle=\"collapse\" href=\"#investigate\">Detecting unusual employee activity<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"investigate\" class=\"block-10f085d3-d9ee-406a-abf5-ff2fa61d95be areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide opacity-25 my-4 d-xl-none\" style=\"background-color:#3a62f2;color:#3a62f2\"\/>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">An employee logs into the system outside working hours.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Syteca automatically detects a deviation from baseline behavior.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Security specialists receive a notification and are able to connect to the user\u2019s live session to see exactly what the user is doing.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-618d9093-e0d5-4882-91c1-6500052a9a50 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1a9128f5-98a6-4858-ab81-bec3f46677ff areoi-element p-poppins h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(19, 60, 148,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-633c0642-14a3-488e-9126-215888acd967 areoi-element d-flex flex-row flex-xl-row-reverse align-items-center pb-xl-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"text-28-22 mb-0 me-4 me-xl-0 has-text-color\" style=\"color:#213153;font-style:normal;font-weight:600\">03<\/p>\n\n\n\n<p class=\"collapsed mb-0 ms-0 flex-grow-1 text-22-18 pe-xl-5 has-text-color\" style=\"color:#213153;font-style:normal;font-weight:600\"><a class=\"collapsed\" data-bs-target=\"#support\" data-bs-toggle=\"collapse\" href=\"#support\">Stopping a policy violation<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"support\" class=\"block-10f085d3-d9ee-406a-abf5-ff2fa61d95be areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide opacity-25 my-4 d-xl-none\" style=\"background-color:#3a62f2;color:#3a62f2\"\/>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">A remote employee tries to install an unauthorized application on one of your office endpoints.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">An associated default alert is triggered.<\/p>\n\n\n\n<p class=\"has-text-align-left d-flex align-items-center px-4 py-3 mb-5 has-white-background-color has-background\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Syteca blocks the user and logs them out of the session. Security officers can then analyze the recorded session at a convenient time.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c4ed6358-f979-46f0-af7b-da2c7ca752dd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f6641fed-c108-40b0-85e2-876021e39fba row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-e6671186-b168-4efc-9c98-ce89d32cadc5 col areoi-element align-self-md-center col-md-12 col-lg-5 col-xl-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-center text-xl-end\"><img decoding=\"async\" width=\"626\" height=\"605\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/07020657\/two-smiling-businessmen-shaking-hands-while-standing-in-an-office-2.png\" alt=\"\" class=\"wp-image-49278\" title=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/07020657\/two-smiling-businessmen-shaking-hands-while-standing-in-an-office-2.png 626w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/07020657\/two-smiling-businessmen-shaking-hands-while-standing-in-an-office-2-300x290.png 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0965efc4-6d69-4907-af00-a7140d4c8cf1 col areoi-element partners d-flex flex-column align-items-center align-items-xl-start align-self-md-center col-md-12 col-lg-7 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading text-center text-xl-start h3-new-design\">They chose the Syteca platform for enhanced cybersecurity<\/h3>\n\n\n\n\t\t<div  class=\"block-eb309f3d-a43e-4f23-977f-fa4252b738d6 areoi-element mw-100 d-flex flex-wrap justify-content-between justify-content-xl-start align-items-center mx-auto mx-xl-0 partners-logo\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-4 me-md-1 ms-md-0 me-xl-3\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/visa.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large mb-4 me-md-1 order-md-0 mx-xl-4\"><img decoding=\"async\" width=\"169\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/12071922\/Payoneer.svg\" alt=\"\" class=\"wp-image-31851\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large mb-4 me-md-0 ms-md-0 ps-md-0 order-md-0 mx-xl-3\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/ups.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large ms-3 mb-4 ms-md-1 me-md-1 order-md-1 ms-xl-4 me-xl-0\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/pecb.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large ms-4 me-auto mb-4 me-md-4 ms-md-0 order-md-4 mx-xl-4\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/deloitte.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large mb-4 me-md-4 order-md-3 me-xl-3\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/finat.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large mb-4 me-md-1 ms-md-1 order-md-4 ms-xl-3\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/slovenia.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large mb-4 me-md-0 ms-md-0 pe-4 pe-md-0 order-md-2 mx-xl-4\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/samsung.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large ms-5 me-2 mb-4 me-md-0 ms-md-0 order-md-2 ms-xl-3\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Vector.svg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large me-5 mb-4 me-md-2 order-md-1 me-xl-3\"><img decoding=\"async\" width=\"152\" height=\"23\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/12072006\/novobanco.svg\" alt=\"\" class=\"wp-image-31858\"\/><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-61ec89c2-6d40-4bd4-a6f2-18fa28ead118 areoi-element new-design d-flex justify-content-start justify-content-md-center justify-content-xl-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-312beef8-2565-435b-aa87-63b136612e38 btn areoi-has-url position-relative btn-primary\"\n\t href=\"\/en\/resources\/case-studies\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tExplore Case Studies \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-916f3433-bab2-4cc0-90ad-1273920b745b areoi-element text-center cta-book-time\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-54-42-36 p-poppins mb-0 container-xxl has-text-color has-link-color wp-elements-511249c98fac5d973b8731a2785094bb\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Schedule a free call with our team to discover how Syteca can meet your security needs<\/p>\n\n\n\n\t\t<div  class=\"block-e90d9688-1609-409d-9d06-08c80a829a11 areoi-element new-design\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a DATA-BS-TOGGLE=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-38236709-b563-4036-a21f-eaa22f7f4681 btn areoi-has-url position-relative btn btn-primary mx-auto mb-0 btn-primary\"\n\t href=\"#book-modal\" >\n\t\t\t\t\t\n\t\t\t\t\tBook a Time Slot Here \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div \n\t\t\tid=\"book-modal\"  \n\t\t\tclass=\"block-fddb5ab0-ea16-4ddb-899d-2e31850bc811 modal fade\"\n\t\t\ttabindex=\"-1\"  \n\t\t\taria-hidden=\"true\"\n\t\t\t\n\t\t>\n\t\t\t<div class=\"modal-dialog modal-xl\">\n    \t\t\t<div class=\"modal-content\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-eacc3ca5-6e63-41c8-ae6f-7f678c29039e modal-header\">\n\t\t\t<div class=\"modal-header-content\"><\/div>\n\t\t\t<button type=\"button\" class=\"btn-close\" data-bs-dismiss=\"modal\" aria-label=\"Close\"><\/button>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ac1df1a8-f1d6-4a79-953d-fffe236e11bf modal-body\">\n\t\t\t\n\n<!-- Start of Meetings Embed Script -->\r\n    <div class=\"meetings-iframe-container\" data-src=\"https:\/\/meetings.hubspot.com\/maryna-yucel\/get-in-touch?embed=true\"><\/div>\r\n    <script type=\"text\/javascript\" src=\"https:\/\/static.hsappstatic.net\/MeetingsEmbed\/ex\/MeetingsEmbedCode.js\"><\/script>\r\n  <!-- End of Meetings Embed Script -->\n\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bb2767e8-9ed0-4cf0-97e2-19dd2c8d9945 modal-footer\">\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3e0c3340-1db2-4e79-8192-62e84ea6259c areoi-element new-design overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h3 class=\"wp-block-heading text-center text-light mb-0 h3-new-design\">Featured resources<\/h3>\n\n\n\n\t\t<div  class=\"block-b9af5078-55f0-44e5-bb96-25d7357118a9 areoi-element container posts-slider\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e589335b-a59c-4dad-9dd0-400e1a3f38c6 row areoi-element blog-slider new-design-resources-slider\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-fcebc93b-e485-4918-8be4-305fec85b081 col areoi-element post-card\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7d05c3bb-61fb-4d57-b452-240d96f0a163 areoi-element card-img\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full post-thumbnail hoverable\"><a href=\"\/en\/blog\/incident-response-plan-tips\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"800\" height=\"520\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212817\/image.png\" alt=\"\" class=\"wp-image-59608\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212817\/image.png 800w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212817\/image-300x195.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212817\/image-768x499.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"\/en\/blog\/incident-response-plan-tips\" target=\"_blank\" rel=\"noreferrer noopener\">Read Now<\/a><\/figcaption><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5537e3ed-4212-41a2-9927-a234be529642 areoi-element card-info\">\n\t\t\t\n\t\t\t\n\n<p class=\"category-label\"><a href=\"\/en\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Blog article<\/a><\/p>\n\n\n\n<p class=\"card-title hoverable\"><a href=\"\/en\/blog\/password-management-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">Incident Response Planning Guidelines for 2024<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fdf12115-5f33-4d6b-9a26-f00f74f12f90 col areoi-element post-card\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-cce54d27-96bf-493c-8e11-c94aaea09b2a areoi-element card-img\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full post-thumbnail hoverable\"><a href=\"\/en\/resources\/case-studies\/pecb-case-study\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"800\" height=\"520\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212825\/image-1.png\" alt=\"\" class=\"wp-image-59615\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212825\/image-1.png 800w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212825\/image-1-300x195.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212825\/image-1-768x499.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"\/en\/resources\/case-studies\/pecb-case-study\" target=\"_blank\" rel=\"noreferrer noopener\">Read Now<\/a><\/figcaption><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4541cd2f-04ce-48c3-bea8-2c86b405459e areoi-element card-info\">\n\t\t\t\n\t\t\t\n\n<p class=\"category-label\"><a href=\"\/en\/resources\/case-studies\" target=\"_blank\" rel=\"noreferrer noopener\">Case study<\/a><\/p>\n\n\n\n<p class=\"card-title hoverable\"><a href=\"\/en\/resources\/case-studies\/pecb-case-study\" target=\"_blank\" rel=\"noreferrer noopener\">PECB Inc. Deploys Syteca to Manage Insider Threats<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fcebc93b-e485-4918-8be4-305fec85b081 col areoi-element post-card\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-628ff4bf-2de6-4b91-9c90-58aff7a8f172 areoi-element card-img\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full post-thumbnail hoverable\"><a href=\"\/en\/blog\/data-breach-investigation-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"800\" height=\"520\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212923\/image-2.png\" alt=\"\" class=\"wp-image-59622\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212923\/image-2.png 800w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212923\/image-2-300x195.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/11212923\/image-2-768x499.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"\/en\/blog\/data-breach-investigation-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">Read Now<\/a><\/figcaption><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7f435926-3d3d-471d-a24d-ee51acd0a6ef areoi-element card-info\">\n\t\t\t\n\t\t\t\n\n<p class=\"category-label\"><a href=\"\/en\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Blog article<\/a><\/p>\n\n\n\n<p class=\"card-title hoverable\"><a href=\"\/en\/blog\/data-breach-investigation-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">Data Breach Response and Investigation: 8 Steps for Efficient Remediation<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div id=\"faq\" class=\"block-758e375c-d868-47c3-8bfc-a9c29d094473 areoi-element new-design\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center wp-embed-aspect-16-9 wp-has-aspect-ratio h3-new-design has-text-color has-link-color wp-elements-f32c645b6a3edc51a5928f7326934f10\" style=\"color:#ffffff\">FAQ<\/h3>\n\n\n\n\t\t<div  class=\"block-a8c150bb-7015-4986-bb9f-859dc6ff18c2 areoi-element container wp-embed-aspect-16-9 wp-has-aspect-ratio overflow-hidden\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0a0c7aea-6017-4eac-bfe6-fc0b022b3cdc row areoi-element m-auto\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2d3125f0-642c-43be-a557-73430f63a20c col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95 accordion accordion-faq\">\n\t\t\t\n\n\t\t<div  class=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is incident response?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4a560eb5-0a15-4da1-9399-536bee83f024 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"with-link\">Incident response is the process of identifying, containing, and resolving security incidents that could potentially harm your organization\u2019s infrastructure, data, or operations.<\/p>\n\n\n\n<p class=\"with-link\">Well-structured incident response procedures help organizations minimize damage, reduce downtime, and quickly restore normal operations while preserving evidence for further investigations.<\/p>\n\n\n\n<p class=\"with-link\">Effective incident response involves establishing an incident response plan, which includes deploying a dedicated security incident management and alerting system.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is an incident response plan?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-99a80d9c-e3cc-48e0-9db4-5ab237f8d466 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"with-link\">An <a href=\"https:\/\/www.syteca.com\/en\/blog\/incident-response-plan-tips\" target=\"_blank\" rel=\"noreferrer noopener\">incident response plan<\/a> (IRP) is a set of predefined procedures and guidelines that must be followed if an organization experiences a security incident.<\/p>\n\n\n\n<p>An IRP usually includes steps for identifying and containing the incident, assessing the damage, notifying the relevant parties, and implementing measures to prevent future incidents. Your IRP should also outline the roles and responsibilities of incident response team members.<\/p>\n\n\n\n<p class=\"mb-0 with-link\">An IRP can help your security officers stay focused and organized in the face of a real cybersecurity incident.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat are the benefits of alerting systems?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-bbca7152-2500-4b10-ad99-f3880ad7a1e9 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"with-link\">Real-time user activity alerts enable organizations to quickly detect and respond to security threats, such as <a href=\"\/en\/blog\/insider-threat-definition\" target=\"_blank\" rel=\"noreferrer noopener\">insider attacks<\/a> or data breaches, before they cause significant damage or losses.<\/p>\n\n\n\n<p>Syteca continuously monitors user activity in your organization and sends automated user activity alerts and notifications to your incident response team when it detects suspicious activity. This empowers your security officers to act immediately and prevent incidents from occurring or escalating.<\/p>\n\n\n\n<p class=\"mb-0 with-link\">Syteca\u2019s incident alert system and automated incident response capabilities can also automatically block users and unauthorized USB devices. Furthermore, Syteca equips your security team with all the tools required for efficient <a href=\"\/en\/solutions\/investigate-security-incidents\" target=\"_blank\" rel=\"noreferrer noopener\">incident investigation<\/a>.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":59631,"parent":3431,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-13525","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incident Alert and Notification Solution \u4e00 Syteca<\/title>\n<meta name=\"description\" content=\"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Alert and Notification Solution \u4e00 Syteca\" \/>\n<meta property=\"og:description\" content=\"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T09:30:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\",\"url\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\",\"name\":\"Incident Alert and Notification Solution \u4e00 Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg\",\"datePublished\":\"2023-04-24T13:57:52+00:00\",\"dateModified\":\"2026-01-29T09:30:18+00:00\",\"description\":\"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Product\",\"item\":\"https:\/\/www.syteca.com\/en\/product\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"User Activity Monitoring Alerts and Notifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident Alert and Notification Solution \u4e00 Syteca","description":"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications","og_locale":"en_US","og_type":"article","og_title":"Incident Alert and Notification Solution \u4e00 Syteca","og_description":"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.","og_url":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications","og_site_name":"Syteca","article_modified_time":"2026-01-29T09:30:18+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications","url":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications","name":"Incident Alert and Notification Solution \u4e00 Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg","datePublished":"2023-04-24T13:57:52+00:00","dateModified":"2026-01-29T09:30:18+00:00","description":"Detect security threats and respond faster with our incident alert system, delivering real-time user activity notifications and swift incident response.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/08\/12041025\/OG-Alerts-Incident-Response.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Product","item":"https:\/\/www.syteca.com\/en\/product"},{"@type":"ListItem","position":2,"name":"User Activity Monitoring Alerts and Notifications"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/13525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=13525"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/13525\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/3431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/59631"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=13525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}