PREVENT INSIDER THREATS
WITH USER ACTIVITY
MONITORING
Presented by [Sales Rep]
WHO ISOBSERVEIT?
 HQ Boston, MA / R&D Tel Aviv, Israel
 Founded 2006
 1,200+ Customers Worldwide
 $20M Invested by Bai...
Employee exposes rich clients'
information online
Call-center workers sold
customer data fined $25M
Employee charged with
...
CHALLENGEWITHADDRESSINGINSIDERTHREATS
“It’s Hard to Distinguish
Abuse from Legitimate Use”
3 out of 4 InfoSec professional...
IT’SNOTA INFRASTRUCTURE PROBLEM
“We realized that infrastructure
monitoring alone was only giving
us half the picture.”
Sn...
INSIDERTHREATINTELLIGENCEWITH OBSERVEIT
Collect
DetectRespond
• User Behavior Analytics
• Activity Alerting
• Visual Recor...
Audit and Compliance
Employees
__________________________________________
Data Extraction and
Fraud
Third-parties
________...
1,200+ CUSTOMERS
THANK YOU
Prevent Insider Threats with User Activity Monitoring
of 10

Prevent Insider Threats with User Activity Monitoring

Gain the visibility and context you need to detect abnormal behavior, get a clear picture of the risk insiders present, and stop them from becoming a threat. You'll learn how to Prevent Insider Threats with ObserveIT: Observe who’s doing what and distinguish insider abuse from legitimate use Detect abnormal user behavior indicative of insiders becoming threats Prevent users from putting your business at risk
Published on: Mar 4, 2016
Published in: Technology      
Source: www.slideshare.net


Transcripts - Prevent Insider Threats with User Activity Monitoring

  • 1. PREVENT INSIDER THREATS WITH USER ACTIVITY MONITORING Presented by [Sales Rep]
  • 2. WHO ISOBSERVEIT?  HQ Boston, MA / R&D Tel Aviv, Israel  Founded 2006  1,200+ Customers Worldwide  $20M Invested by Bain Capital The Leading Provider Of User Activity Monitoring To Prevent Insider Threats
  • 3. Employee exposes rich clients' information online Call-center workers sold customer data fined $25M Employee charged with stealing customer data DBA account compromised leaves 78.8M affected Third-party credentials stolen leaves 56M affected Admin account compromised exposed 11M Medical records RECENTBREACHESINVOLVING INSIDERS
  • 4. CHALLENGEWITHADDRESSINGINSIDERTHREATS “It’s Hard to Distinguish Abuse from Legitimate Use” 3 out of 4 InfoSec professionals say 260,000+ members
  • 5. IT’SNOTA INFRASTRUCTURE PROBLEM “We realized that infrastructure monitoring alone was only giving us half the picture.” Snir Hoffman, InfoSec Architect
  • 6. INSIDERTHREATINTELLIGENCEWITH OBSERVEIT Collect DetectRespond • User Behavior Analytics • Activity Alerting • Visual Recording • User Activity Logs • Live Session Replay • Shutdown Sessions COLLECT CLEAR INSIDER THREAT INFORMATION DETECT INSIDER RISK BEFORE IT BECOMES A THREAT RESPOND TO USERS PUTTING YOUR BUSINESS AT RISK USERS
  • 7. Audit and Compliance Employees __________________________________________ Data Extraction and Fraud Third-parties __________________________________________ IP Theft and Service Availability Privileged Users __________________________________________ Access Abuse and Data leaks SCOPE OFINSIDERTHREATS
  • 8. 1,200+ CUSTOMERS
  • 9. THANK YOU

Related Documents