prevent insider threats with user activity monitoring

10
PREVENT INSIDER THREATS WITH USER ACTIVITY MONITORING Presented by [Sales Rep]

Upload: observeit

Post on 13-Aug-2015

159 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Prevent Insider Threats with User Activity Monitoring

PREVENT INSIDER THREATSWITH USER ACTIVITY MONITORING

Presented by [Sales Rep]

Page 2: Prevent Insider Threats with User Activity Monitoring

WHO IS OBSERVEIT?

HQ Boston, MA / R&D Tel Aviv, Israel Founded 2006 1,200+ Customers Worldwide $20M Invested by Bain Capital

The Leading Provider Of User Activity Monitoring To Prevent Insider Threats

Page 3: Prevent Insider Threats with User Activity Monitoring

Employee exposes rich clients' information

online

Call-center workers sold customer data fined

$25M

Employee charged with stealing customer data

DBA account compromised

leaves 78.8M affected

Third-party credentials

stolen leaves 56M affected

Admin account compromised exposed 11M Medical records

RECENT BREACHES INVOLVING INSIDERS

Page 4: Prevent Insider Threats with User Activity Monitoring

CHALLENGE WITH ADDRESSING INSIDER THREATS

“It’s Hard to Distinguish Abuse from Legitimate Use”

3 out of 4 InfoSec professionals say

260,000+ members

Page 5: Prevent Insider Threats with User Activity Monitoring

IT’S NOT A INFRASTRUCTURE PROBLEM

“We realized that infrastructure monitoring alone was only giving

us half the picture.”

Snir Hoffman, InfoSec Architect

Page 6: Prevent Insider Threats with User Activity Monitoring

INSIDER THREAT INTELLIGENCE WITH OBSERVEIT

Collect

DetectRespond

• User Behavior Analytics

• Activity Alerting

• Visual Recording• User Activity

Logs

• Live Session Replay

• Shutdown Sessions

COLLECT CLEAR INSIDER THREAT INFORMATION

DETECT INSIDER RISK BEFORE IT BECOMES A THREAT

RESPOND TO USERS PUTTING YOUR BUSINESS AT RISK

USERS

Page 7: Prevent Insider Threats with User Activity Monitoring

Audit and Compliance

Employees__________________________________________

Data Extraction and Fraud

Application Access, Call Centers, and Watchlists

Third-parties__________________________________________

IP Theft and Service

Availability

Contractors, Remote Vendors, Outsourced IT

Privileged Users

__________________________________________

Access Abuse and Data leaks

Help Desk, DBAs, HPAs, SoD and Sys Admins

SCOPE OF INSIDER THREATS

Audit Controls for PCI / PII / PHI Data, Monitoring Privileged and 3rd Party Access, Alerting for Access to

Sensitive systems

Page 8: Prevent Insider Threats with User Activity Monitoring
Page 9: Prevent Insider Threats with User Activity Monitoring

1,200+ CUSTOMERS

Page 10: Prevent Insider Threats with User Activity Monitoring

THANK YOU