Quantcast
Channel: Networks Asia - IT news
Viewing all articles
Browse latest Browse all 2029

Forcepoint's SureView Insider Threat now available in S'pore

$
0
0
Forcepoint’s SureView Insider Threat now available in S’pore

Forcepoint’s SureView Insider Threat, a security tool that helps companies prevent data theft and loss from hijacked systems, rogue insiders, stolen credentials and negligent end users is now available in Singapore.

The company says SureView Insider Threat lets security professionals see early warning signs of abnormal behaviors, capture a video record of desktop activity and intervene before sensitive data gets breached or stolen.

Forcepoint further said that SureView allows companies in Singapore to spot risky behavior and activity across their enterprises, delivering better security and increased regulatory compliance while respecting privacy. For nearly a decade, technology in SureView Insider Threat has served U.S.-based enterprises and government agencies in detecting and responding to insider threats. It was a core technology transferred from Raytheon to Forcepoint when the company launched. 

“Insiders do more damage and go undetected longer than external threats. Until now, global enterprises haven’t had an effective tool to protect against threats from within. Forcepoint is redefining what it means to secure an organization, by thinking more in terms of ‘inside-out’ rather than ‘outside-in,’” said Matt Moynahan, Forcepoint Chief Executive Officer.

Negligence by ordinary employees is the number one cause of insider threats, and whether malicious, accidental or hijacked, threats inside the network are far more harmful than outside attackers. On average, external cyber criminals can operate undetected for 170 days, but insiders escape detection for 259 days.

Because insiders have more time to operate and better insight to where valuable data is stored, they cause far more damage per incident: the 10 percent of total incidents attributed to insiders are responsible for more than half of stolen data. On average, a data breach costs an enterprise US$3.8 million, yet despite the greater risk posed by insiders, the majority of security spending remains focused on external threats.

“When Forcepoint launched, one of the key goals was to find ways to deliver Raytheon technology to commercial enterprises,” said Moynahan. “By developing an internationally available version of SureView, we’re bringing that vision to life.”

How SureView Insider Threat Works

SureView Insider Threat allows organizations to identify and stop insider threats through an objective, rigorous process of verification that captures all relevant data while respecting user privacy. SureView technology connects the dots, capturing human behaviors arising from carelessness, lack of training or malicious intent that may be warning signs of an impending breach.

SureView Insider Threat identifies risk by baselining “normal” user behavior. The technology then recognizes deviations from the norm, such as a change in data access, working hours, email activity or copying files from network to desktop. SureView can also spot deviations in activity at the endpoint which may indicate a different person using stolen credentials or a system hijacked by malware. These risk indicators serve as warning signs that may be investigated further.

Forcepoint features DVR-like video capture and playback of end user desktop activity for both Windows and Mac OS endpoints. Video can provide insight into the possible motivations of suspicious behaviors before they become problems, such as employees creating back doors or stockpiling data.

For negligent users, video playback can provide a valuable training and education tool. For malicious insiders, the forensic-grade record provides attribution that is admissible in a court of law. It can even help absolve innocent users whose machines have been hijacked and are silently performing actions behind the users’ backs.

SureView Insider Threat integrates with Forcepoint’s Data Loss Prevention (DLP) solution, a powerful combination that provides user behavior context around inappropriate attempts to transfer sensitive data, enabling faster and more targeted remediation.


Viewing all articles
Browse latest Browse all 2029

Trending Articles