{"id":25019,"date":"2023-06-06T04:00:55","date_gmt":"2023-06-06T11:00:55","guid":{"rendered":"https:\/\/www.syteca.com\/en?post_type=resources&#038;p=25019"},"modified":"2025-06-10T15:59:44","modified_gmt":"2025-06-10T22:59:44","slug":"us-based-financial-services-company","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company","title":{"rendered":"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca"},"content":{"rendered":"\n\t\t<div  class=\"block-2d011a51-c457-46cc-9486-e88f9dab54d1 areoi-element case-banner\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/16001613\/casestudy-pic-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Ekran-System.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-e6084275-1184-48f7-80e6-3f947dc65c33 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff57bfaa-921f-403b-9a0b-bdb2eb9eda14 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-6ed7566a-dc14-4359-9a84-ac740c64f579 col areoi-element\">\n\t\t\t\n\t\t\t\n<div id=\"breadcrumbs\" class=\"yoast-breadcrumbs  \"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\">Case Study<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca<\/span><\/span><\/div>\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center p-poppins has-text-color\" style=\"color:#4790ea;font-size:1.13rem;font-style:normal;font-weight:600\">Case Study<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center pt-3 pt-lg-4 px-xxl-5 has-white-color has-text-color\">A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca<\/h1>\n\n\n\n\t\t<div  class=\"block-3b280a63-efbe-4499-a7a5-040144bc0fa4 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bc2b395a-7724-4ba3-8b9b-be11d19df824 col areoi-element d-flex align-items-center col-6 col-md-3 col-lg-2 offset-lg-2 offset-xxl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/01043817\/Location.svg\" alt=\"\" class=\"wp-image-24797\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-178b3a88-2d90-444e-8c1d-586cb08182dc areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 has-white-color has-text-color\">Industry<\/p>\n\n\n\n<p class=\"mb-0 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Financial services<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-054c667a-0298-4d22-8ad9-60bd4f09d868 col areoi-element d-flex align-items-center col-6 col-md-3 col-lg-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/01044330\/Location-1.svg\" alt=\"\" class=\"wp-image-24805\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-77b39191-8c56-4065-acd1-1003c5aa2d74 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 has-white-color has-text-color\">Location<\/p>\n\n\n\n<p class=\"mb-0 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">US<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3ef6cd9f-9d92-48aa-9436-7c3992983aed col areoi-element d-flex align-items-center col-12 col-md-6 col-lg-4 col-xxl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02050847\/Comply.svg\" alt=\"\" class=\"wp-image-24907\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-cdf35924-e522-47b9-b873-6953a57b34c3 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 has-white-color has-text-color\">Must comply with<\/p>\n\n\n\n<p class=\"mb-0 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">PCI DSS, SWIFT CSP, NIST 800-53<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5b6b7e43-1a07-4824-8e52-b5462d7805c0 areoi-element text-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-d7217922-3376-44b7-a538-5deadd2f68ce btn areoi-has-url position-relative btn-info\"\n\t href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/06\/06113006\/Case-Study-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users.pdf\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload Case Study \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-587a57e7-f5a8-4789-be69-a04c485ca0b5 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3ab7f3c3-be7d-40c8-9c80-7cb475afcaaf row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0c31d500-7aae-4c5e-a28e-74b4a7bb0bb8 col areoi-element with-link col-12 col-lg-8\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-lg-4\">About<\/h2>\n\n\n\n\t\t<div  class=\"block-ed825f17-02ab-4009-9ea6-32c80aaa5003 row areoi-element case-about\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-8220eac8-587d-485c-ae6a-0dbfed951fc7 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-832a2499-806e-44b0-aede-a3c845204875 areoi-element h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Pending issue<\/p>\n\n\n\n<p class=\"mb-0\">Monitor privileged user activity on Windows and Linux jump servers with a single tool.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-da3479cb-d847-4cf6-9fea-8d9800674521 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f0e38e22-5ad8-473d-95e3-109fc61063a6 areoi-element h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">The customer<\/p>\n\n\n\n\t\t<div  class=\"block-4aa9a83d-e96b-48b0-a78d-cf73551e60b0 areoi-element d-flex justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0ac05978-c2a7-4445-be3c-949598d1b797 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p>US-based Financial Services Company<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<p class=\"p-poppins has-text-color\" style=\"color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Customer&#8217;s requests<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor user activity on jump servers&nbsp;<\/li>\n\n\n\n<li>Gather user activity data for audits&nbsp;<\/li>\n\n\n\n<li>Get a monitoring solution that could support both Windows and Linux operating systems&nbsp;<\/li>\n\n\n\n<li>Offline updates <\/li>\n<\/ul>\n\n\n\n\t\t<div  class=\"block-a1e0a1be-04e3-4212-925a-21f90691c2e4 row areoi-element case-quote\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5ce6b94-dc21-48d6-a0cd-835f273d0a37 col areoi-element col-2 col-md-1\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"41\" height=\"26\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/05234643\/quote.svg\" alt=\"\" class=\"wp-image-24974\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8480d842-2a45-478d-bb5d-c32df4c3956d col areoi-element col-10 col-md-11\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-af0a2b89-7dbe-4027-b483-d64c109750f3 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-style:normal;font-weight:500\">Syteca was the only solution that allowed us to monitor servers running different OSs and install critical updates offline. Getting the same monitoring functionality for a reasonable price was an unexpected benefit of this cooperation.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">The challenge<\/h2>\n\n\n\n<p>As a financial organization, our customer constantly works with financial records, cardholder data, personal information of end customers, and other highly sensitive data. They must secure this data and monitor its use as well as comply with multiple cybersecurity requirements including PCI DSS, SWIFT CSP, and NIST 800-53.&nbsp;<\/p>\n\n\n\n<p>To enhance information security, the customer stores most of their critical data in private data centers. Access to this data is provided only to privileged users (both remote workers and third parties) and can only be obtained by connecting to protected jump servers via a VPN.&nbsp;<\/p>\n\n\n\n<p>Our customer required <a href=\"\/en\/industries\/finance\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity software for financial industry<\/a> that could monitor user activity on jump servers, gather user activity data for audits, support Windows and Linux operating systems, as well as allow for offline updates.<\/p>\n\n\n\n<p>Previously, the customer used a different popular insider threat management solution, but that product didn&#8217;t fully meet their requirements. In particular, the customer wanted to monitor both Windows and Linux servers with a single tool. They also preferred updating the monitoring software offline to minimize the risk of data compromise.&nbsp;<\/p>\n\n\n\n<p>After considering several alternative solutions, the customer decided to deploy Syteca.<\/p>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">The result<\/h2>\n\n\n\n<p>Deploying Syteca allowed our client to address each of their key requests and achieve the following results:<\/p>\n\n\n\n\t\t<div  class=\"block-a24db176-8247-46d8-b4e9-c662de536f50 areoi-element rounded-bg-13px p-poppins case-result\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul style=\"font-style:normal;font-weight:600\" class=\"wp-block-list\">\n<li class=\"mb-4\">A full and clear picture of each user\u2019s actions&nbsp;<\/li>\n\n\n\n<li class=\"mb-4\">Compliance with cybersecurity requirements&nbsp;<\/li>\n\n\n\n<li class=\"mb-4\">Retrospective analysis of cybersecurity events&nbsp;<\/li>\n\n\n\n<li class=\"mb-4\">All servers are monitored with one solution&nbsp;<\/li>\n\n\n\n<li class=\"mb-4\">Enhanced protection of critical data&nbsp;<\/li>\n\n\n\n<li>Seamless integration into the established workflow<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p>Additionally, our customer enhanced their data security by leveraging Syteca\u2019s USB device management functionality. Now, they can monitor and control all connected devices and set rules for blocking the connection of prohibited device types.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-687a6b2b-53f4-4a30-bfee-b4bb1f8a9e3a col areoi-element col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-98cb1fbc-aed1-4cf9-880e-7f72df218af2 areoi-element rounded-bg-13px case-sidebar\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins lh-sm text-md-start text-lg-center\" style=\"font-size:1.75rem;font-style:normal;font-weight:600\">See how Syteca enabled the customer&#8217;s success<\/p>\n\n\n<div class=\"wp-block-image mx-5 mx-md-4 mx-lg-0 mx-xxl-5\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"420\" height=\"566\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/04012302\/prev-casestudy-pic-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Syteca.png\" alt=\"\" class=\"wp-image-56849\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/04012302\/prev-casestudy-pic-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Syteca.png 420w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/04012302\/prev-casestudy-pic-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Syteca-223x300.png 223w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-5b6b7e43-1a07-4824-8e52-b5462d7805c0 areoi-element text-center text-md-start text-lg-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-d7217922-3376-44b7-a538-5deadd2f68ce btn areoi-has-url position-relative btn-info\"\n\t href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/06\/06113006\/Case-Study-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users.pdf\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload Case Study \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<div class=\"wp-block-group block-share-social-buttons align-items-start is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\">\n<p class=\"p-poppins mb-2\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/a-european-bank-mitigates-third-party-admin-risks-with-ekran-system\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?text=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer d-lg-none\"><\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4a9ad971-877c-4358-928f-563fa6bf2d39 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-622a6876-6e33-4a3b-b7b6-397210f01aa7 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d7488c1a-1e49-45ac-8a11-1a46acd4ac5b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-00ae1e1d-5f6a-496f-970c-5c6c5ebaf7c1 col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\">Need to secure sensitive data from insider threats?<\/h2>\n\n\n\n<p class=\"opacity-75 text-center text-md-start mt-3 mt-lg-4\">Start doing it today by requesting the Syteca trial.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-c0dc3617-7a65-4db3-83e2-8e7c59a3f156 areoi-element  d-flex flex-column flex-lg-row align-items-center align-items-md-start mt-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-trial\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-cd402102-0e8c-4222-b674-431d8e724ddf btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-trial btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tRequest a Free Trial \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-30e202bc-04d4-4930-b731-11a90778b793 btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-de44dd61-d334-40d2-ba60-0302245aa9a0 col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-100\"><img decoding=\"async\" width=\"1024\" height=\"642\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-1024x642.png\" alt=\"\" class=\"wp-image-21486\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-1024x642.png 1024w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-300x188.png 300w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-768x482.png 768w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image.png 1354w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"featured_media":47844,"menu_order":0,"template":"","class_list":["post-25019","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-case-studies","use_cases-privileged-user-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca<\/title>\n<meta name=\"description\" content=\"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca\" \/>\n<meta property=\"og:description\" content=\"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T22:59:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/06113030\/OG-Case-study-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Syteca.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/16021611\/OG-CaseStudy-prev-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Ekran-System-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\",\"name\":\"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png\",\"datePublished\":\"2023-06-06T11:00:55+00:00\",\"dateModified\":\"2025-06-10T22:59:44+00:00\",\"description\":\"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png\",\"width\":1330,\"height\":804},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca","description":"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company","og_locale":"en_US","og_type":"article","og_title":"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca","og_description":"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.","og_url":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company","og_site_name":"Syteca","article_modified_time":"2025-06-10T22:59:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/06113030\/OG-Case-study-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Syteca.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/16021611\/OG-CaseStudy-prev-A-US-based-Financial-Services-Company-Effectively-Monitors-and-Audits-Privileged-Users-with-Ekran-System-1.png","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company","url":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company","name":"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png","datePublished":"2023-06-06T11:00:55+00:00","dateModified":"2025-06-10T22:59:44+00:00","description":"Discover how a US-based financial services company benefited from privileged user activity monitoring with Syteca.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png","width":1330,"height":804},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Case Study","item":"https:\/\/www.syteca.com\/en\/resources\/case-studies"},{"@type":"ListItem","position":3,"name":"A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/25019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/47844"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=25019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}