Every user event is logged and reported in the BEM database, for
quick auditing, and a full view of end user events and usage. BEM makes
it straightforward to comply with data policies set by organisations and
Administrators can remove and control different levels of user
access to devices and data. A password policy manager is integrated
within user management, and in the event of device loss or theft,
administrators can access device management to view encryption status
and protect data.
A notification is sent to the administrator when a user is
consistently having difficulties logging on in a short period,
attempting to connect an external device that does not comply with the
external plugin policy, or attempting to access files that are not in
their authorised permission.