Insider threats

Managing human risk

The soft side of cybersecurity handles risks related to employees and vendors

Employees and third party vendors bring different kinds of threats to the enterprise. Misuse of administrative privileges, data theft, espionage, misconduct and social engineering operate very differently from external cyber threats, and require their own approach of human risk management security products.

Our vendors

WALLIX

The WALLIX Bastion is a key element of corporate cyber-hygiene: it creates a single point-of-entry to the entire infrastructure, monitors and records administrative sessions, handles passwords and enforces strong authentication to control the work of privileged users. WALLIX is our network-level, gateway approach to privileged access management (PAM).

More about WALLIX WALLIX global site

XTON Technologies

XTON Access Manager (XTAM) is a privileged account management solution that is focused on creating a customizable vault for all enterprise passwords and secrets. XTAM can directly import password databases and instantly provide delegation and control over the most critical company secrets. XTAM also provides session recording and monitoring functionality, so privileged accounts can work in a controlled manner, significantly contributing to the organizational cyber-hygiene.

XTON Technologies global site

Teramind

The complete insider threat management solution from Teramind is our agent-based solution that can be deployed on all enterprise machines. Teramind focuses on controlling every user activity and making them compliant with the company's security policy. Teramind can also block risky activties with a wide range of DLP features, and provides a clear behavior-based risk scoring for all employees.

More about Teramind Teramind global site

Varonis

Date-centric security pioneer Varonis deploys it's agents on file servers and Active Directory domain controllers, to start monitoring and regulating data flow inside the enterprise. Being the most-reviewed platform for File Analysis and User and Entitiy Behavior Analytics (UEBA) on Gartner PeerInsights, Varonis has a wide userbase and mature functionality to bring data-centric thinking on threats and incidents to every security operation team.

Varonis global site

Use cases

Human risk is often the most important remaining, unmanaged risk in a medium or large enterprise. Security teams can find a wide range of use-cases from user behavior monitoring to data-centric incident detection and response.

Remote vendor control

Monitoring, recording and controlling the activities of remote vendors with administrative privileges is essential for a secure enterprise environment.

Password management

Handling enterprise passwords and big-impact social media accounts in an auditable and accountable way is an essential element of cyber-hygiene.

File/data activity monitoring

Answering even simple questions like Who accessed this document? Who deleted this file? Who printed that? are practically impossible without activity recording and monitoring tools.

Improving user productivity

Understanding user activity and workplace behavior, time spent on different websites and applications are important points for measuring and improving employee productivity.

Session recording

Screen and user activity recording makes every day work accountable and creates a psychological barrier that will make every insider think twice before committing malicious or illegal actions.

Data loss prevention

Stopping malicious user behavior like intentional data theft can be a key priority for enterprises looking to safeguard their business and R&D secrets.

Fast detection and response

Data access and Active Directory monitoring provides a new way for security operators to react to incidents quickly. Ransomware and fast moving threats can be quickly identified and stopped by unusual data access patterns.

Sensitive data discovery

Discovering where sensitive data is located and how it is accessed is a key step for GDPR compliance projects. Data-centric security solutions help reduce the access to sensitive data, minimizing the potential for external data theft.