{"id":55201,"date":"2025-04-08T00:17:27","date_gmt":"2025-04-08T07:17:27","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=55201"},"modified":"2025-06-17T04:03:26","modified_gmt":"2025-06-17T11:03:26","slug":"eilat-port","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port","title":{"rendered":"Eilat Port Monitors the Activity of External Developers Within Their Servers"},"content":{"rendered":"\n\t\t<div  class=\"block-2d011a51-c457-46cc-9486-e88f9dab54d1 areoi-element case-banner\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(0, 0, 0,1)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000152\/casestudy-pic-Eilat-Port.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-e6084275-1184-48f7-80e6-3f947dc65c33 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff57bfaa-921f-403b-9a0b-bdb2eb9eda14 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-6ed7566a-dc14-4359-9a84-ac740c64f579 col areoi-element\">\n\t\t\t\n\t\t\t\n<div id=\"breadcrumbs\" class=\"yoast-breadcrumbs  \"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\">Case Study<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">Eilat Port Monitors the Activity of External Developers Within Their Servers<\/span><\/span><\/div>\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center p-poppins has-text-color\" style=\"color:#4790ea;font-size:1.13rem;font-style:normal;font-weight:600\">Case Study<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center pt-3 pt-lg-4 px-xxl-5 has-white-color has-text-color\">Eilat Port Monitors the Activity of External Developers Within Their Servers<\/h1>\n\n\n\n\t\t<div  class=\"block-3b280a63-efbe-4499-a7a5-040144bc0fa4 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bc2b395a-7724-4ba3-8b9b-be11d19df824 col areoi-element d-flex align-items-center col-6 col-md-3 col-lg-2 offset-lg-2 offset-xxl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/01043817\/Location.svg\" alt=\"\" class=\"wp-image-24797\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-178b3a88-2d90-444e-8c1d-586cb08182dc areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 has-white-color has-text-color\">Industry<\/p>\n\n\n\n<p class=\"mb-0 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Transportation and logistics<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-054c667a-0298-4d22-8ad9-60bd4f09d868 col areoi-element d-flex align-items-center col-6 col-md-3 col-lg-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/01044330\/Location-1.svg\" alt=\"\" class=\"wp-image-24805\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-77b39191-8c56-4065-acd1-1003c5aa2d74 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 has-white-color has-text-color\">Location<\/p>\n\n\n\n<p class=\"mb-0 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Israel<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5b6b7e43-1a07-4824-8e52-b5462d7805c0 areoi-element text-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-d7217922-3376-44b7-a538-5deadd2f68ce btn areoi-has-url position-relative btn-info\"\n\t href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000046\/Case-study-Eilat-Port.pdf\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload Case Study \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-587a57e7-f5a8-4789-be69-a04c485ca0b5 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3ab7f3c3-be7d-40c8-9c80-7cb475afcaaf row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0c31d500-7aae-4c5e-a28e-74b4a7bb0bb8 col areoi-element col-12 col-lg-8\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-lg-4\">About<\/h2>\n\n\n\n\t\t<div  class=\"block-ed825f17-02ab-4009-9ea6-32c80aaa5003 row areoi-element case-about\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-850e51ca-0510-4c0a-9579-f8e2bc3e55a9 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p><strong>The Port of Eilat<\/strong> Israel\u2019s biggest seaport on the Red Sea, serving as a critical gateway for international trade. As a government-owned facility under the Ministry of Transport, it handles sensitive logistics, shipping data, and infrastructure systems. Ensuring the security of its IT environment is essential for both national security and regulatory compliance.<\/p>\n\n\n\n<p><strong>Customer\u2019s requests<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oversee third-party activity with servers and databases<\/li>\n\n\n\n<li>Prevent unauthorized vendor activities&nbsp;<\/li>\n\n\n\n<li>Ensure compliance with cybersecurity regulations set by the Ministry of Transport<\/li>\n\n\n\n<li>Reduce the IT team&#8217;s workload by automating monitoring.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">The challenge<\/h2>\n\n\n\n<p>As the Port of Eilat turned to a third-party company to manage its core applications, servers, and databases. The external development team had full administrative permissions, including access to the port&#8217;s databases and operational servers, which posed a huge risk. In addition, the Ministry of Transport&#8217;s cybersecurity division raised concerns about a foreign company connecting to Eilat Port&#8217;s IT environment without supervision.&nbsp;<\/p>\n\n\n\n<p class=\"mb-0\">That&#8217;s why Port Eilat&#8217;s IT team needed an efficient way to track all vendor activities and provide detailed audit trails for regulatory bodies. The company also wanted to record full third-party sessions and receive instant alerts on high-risk activities. This scenario is a bright example of user activity monitoring use cases, where visibility and accountability are critical to maintaining security and compliance.<\/p>\n\n\n\n\t\t<div  class=\"block-a1e0a1be-04e3-4212-925a-21f90691c2e4 row areoi-element case-quote\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5ce6b94-dc21-48d6-a0cd-835f273d0a37 col areoi-element col-2 col-md-1\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"41\" height=\"26\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/05234643\/quote.svg\" alt=\"\" class=\"wp-image-24974\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8480d842-2a45-478d-bb5d-c32df4c3956d col areoi-element mb-4 col-10 col-md-11\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-af0a2b89-7dbe-4027-b483-d64c109750f3 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p><em>We have an external company managing our database and core application, but we had no clear way to track what they were doing. This was a huge risk for us. Syteca closed all the gaps.&nbsp;<\/em><\/p>\n\n\n\n<p><em>With Syteca in place, there are no security concerns about referring to a third-party support team. We know that we have full monitoring of whatever they are doing.<\/em><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"p-poppins mt-4 mb-0\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\"><em><em>Gera Bider<\/em><\/em><\/p>\n\n\n\n<p style=\"font-size:0.88rem\"><em><em>&nbsp;IT Manager at Eilat Port<\/em><\/em><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">The result<\/h2>\n\n\n\n<p>By implementing Syteca, the Port of Eilat managed to:<\/p>\n\n\n\n\t\t<div  class=\"block-a24db176-8247-46d8-b4e9-c662de536f50 areoi-element rounded-bg-13px p-poppins case-result\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul style=\"font-style:normal;font-weight:600\" class=\"wp-block-list\">\n<li class=\"mb-4\">Get 100% visibility into third-party activities, eliminating security blind spots<\/li>\n\n\n\n<li class=\"mb-4\">Record full user sessions, enabling the IT team to monitor exactly how vendors interact with their critical systems<\/li>\n\n\n\n<li class=\"mb-4\">Pass cybersecurity audits by providing clear, recorded evidence of vendor activities<\/li>\n\n\n\n<li class=\"mb-4\">Save time for the IT department by automating third-party monitoring, allowing the team to focus on strategic initiatives<\/li>\n\n\n\n<li class=\"mb-4\">Omit complex installations due to the seamless integration of Syteca&#8217;s agent with the Google Cloud environment<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-179f69d7-5f25-4830-89e3-9f78c1d8605b row areoi-element case-about\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1c0227fe-089c-4d0b-921c-a078d4772be1 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p>This UAM case study highlights how Syteca turned out to be an excellent solution for the small IT team responsible for managing critical national infrastructure. With complete session recording, real-time alerts, and a proactive incident response system, the port now operates with confidence, knowing that its most critical systems remain protected \u2014 even when managed by third-party vendors.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-687a6b2b-53f4-4a30-bfee-b4bb1f8a9e3a col areoi-element col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-98cb1fbc-aed1-4cf9-880e-7f72df218af2 areoi-element rounded-bg-13px case-sidebar\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins lh-sm text-md-start text-lg-center\" style=\"font-size:1.75rem;font-style:normal;font-weight:600\">See how Syteca enabled the customer&#8217;s success<\/p>\n\n\n<div class=\"wp-block-image mx-5 mx-md-4 mx-lg-0 mx-xxl-5\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"420\" height=\"566\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000009\/prev-casestudy-Eilat-Port.png\" alt=\"\" class=\"wp-image-55202\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000009\/prev-casestudy-Eilat-Port.png 420w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000009\/prev-casestudy-Eilat-Port-223x300.png 223w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-5b6b7e43-1a07-4824-8e52-b5462d7805c0 areoi-element text-center text-md-start text-lg-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-d7217922-3376-44b7-a538-5deadd2f68ce btn areoi-has-url position-relative btn-info\"\n\t href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000046\/Case-study-Eilat-Port.pdf\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload Case Study \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<div class=\"wp-block-group block-share-social-buttons align-items-start is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\">\n<p class=\"p-poppins mb-2\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  me-2 wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?text=https%3A\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer d-lg-none\"><\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4a9ad971-877c-4358-928f-563fa6bf2d39 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-622a6876-6e33-4a3b-b7b6-397210f01aa7 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d7488c1a-1e49-45ac-8a11-1a46acd4ac5b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-00ae1e1d-5f6a-496f-970c-5c6c5ebaf7c1 col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\">Need to secure sensitive data from insider threats?<\/h2>\n\n\n\n<p class=\"opacity-75 text-center text-md-start mt-3 mt-lg-4\">Start doing it today by requesting the Syteca trial.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-c0dc3617-7a65-4db3-83e2-8e7c59a3f156 areoi-element  d-flex flex-column flex-lg-row align-items-center align-items-md-start mt-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-trial\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-cd402102-0e8c-4222-b674-431d8e724ddf btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-trial btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tRequest a Free Trial \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-30e202bc-04d4-4930-b731-11a90778b793 btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-de44dd61-d334-40d2-ba60-0302245aa9a0 col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-100\"><img decoding=\"async\" width=\"1024\" height=\"642\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-1024x642.png\" alt=\"\" class=\"wp-image-21486\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-1024x642.png 1024w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-300x188.png 300w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image-768x482.png 768w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/CTA-image.png 1354w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"featured_media":55223,"menu_order":0,"template":"","class_list":["post-55201","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-case-studies","use_cases-privileged-user-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Eilat Port Oversees Third-party Activity within Their Critical Systems<\/title>\n<meta name=\"description\" content=\"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eilat Port Oversees Third-party Activity within Their Critical Systems\" \/>\n<meta property=\"og:description\" content=\"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T11:03:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08001236\/OG-CaseStudy-Eilat-Port.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08001248\/OG-CaseStudy-Eilat-Port-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\",\"name\":\"Eilat Port Oversees Third-party Activity within Their Critical Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png\",\"datePublished\":\"2025-04-08T07:17:27+00:00\",\"dateModified\":\"2025-06-17T11:03:26+00:00\",\"description\":\"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png\",\"width\":1378,\"height\":868},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/case-studies\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Eilat Port Monitors the Activity of External Developers Within Their Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Eilat Port Oversees Third-party Activity within Their Critical Systems","description":"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port","og_locale":"en_US","og_type":"article","og_title":"Eilat Port Oversees Third-party Activity within Their Critical Systems","og_description":"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.","og_url":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port","og_site_name":"Syteca","article_modified_time":"2025-06-17T11:03:26+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08001236\/OG-CaseStudy-Eilat-Port.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08001248\/OG-CaseStudy-Eilat-Port-1.png","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port","url":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port","name":"Eilat Port Oversees Third-party Activity within Their Critical Systems","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png","datePublished":"2025-04-08T07:17:27+00:00","dateModified":"2025-06-17T11:03:26+00:00","description":"Check out how Syteca UAM enhanced the cybersecurity of Eilat Port, reduced the burden on the IT staff, and helped them pass audits.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/04\/08000925\/casestudy-pic-Eilat-Port-1.png","width":1378,"height":868},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/case-studies\/eilat-port#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Case Study","item":"https:\/\/www.syteca.com\/en\/resources\/case-studies"},{"@type":"ListItem","position":3,"name":"Eilat Port Monitors the Activity of External Developers Within Their Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/55201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/55223"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=55201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}