Insider Risk Management & Actionable Reporting ~ No Video Required


In our previous Blog post on IRM versus Insider Threat Monitoring we discussed the importance of behavioral analysis as an input signal in determining insider risk. Why? Because without indicators of human intent to provide context to data from cyber sensors that capture signals from machines and applications, there is no intelligence as to why or for what reason these risks are emerging. SOC personnel are inundated with warnings, they need something to separate fact from fiction.

Detecting real insider threats requires processing, correlating, and sorting information from various security solutions. Too much data, whether inaccurate, inconsistent, incomplete or duplicate, makes this task more difficult. Too little data adds to their workload and makes detecting threats quickly impossible. But security reports aren’t just for security analysts.

Security and executive leadership require up-to-date and accurate reporting on the organization’s security profile and emerging threats. Incident response personnel need forensic data to block and recover from attacks. Compliance professionals need information to satisfy audits.

Insider threat monitoring solutions such as Proofpoint ITM focus on raw evidence in the form of video logs and event logs. In turn, these are processed as .CSV files using reporting solutions such as Microsoft Excel. While these can be useful for SOC analysts, they offer little reporting value to management.

Unlike surveillance solutions, the DTEX INTERCEPT Platform provides actionable intelligence in an accessible, interactive format that delivers comprehensive forensic data and user investigation information with just a few clicks. No additional analyst work required. It includes a full suite of automated reports and dashboards containing intuitive, pivoting visualizations that are easy to understand and actionable for the analyst, incident response manager, and organizational management.

Specific CISO reports designed for consistent assessment of risk posture and improvement strategies. DTEX includes a wide range of customizable reporting options with a comprehensive set of visualizations and dashboard functionality for advanced analyst and survey teams.

Most importantly, DTEX provides comprehensive reporting without violating employee privacy with our patented pseudonymization technical. Raw data fields including username, email address, IP address, domain name, and device name are tokenized. When evidence points to a threat, certain privileged DTEX users can anonymize user identities for investigations. DTEX alerts security to suspicious activity early in the destruction chain before data can be exfiltrated, while protecting user privacy until unmasking is warranted.

Insider threat protection does not require intrusive employee monitoring. To learn more about the differences between Insider Risk Management and Insider Threat Surveillance solutions, download our complete e-book.

In our next IRM vs Insider Surveillance blog post, we will explore the issue of Time to Value between intelligence solutions and surveillance tools.

The post office Insider Risk Management & Actionable Reporting ~ No Video Required appeared first on DTEX Systems Inc..

*** This is a syndicated blog from the Security Bloggers Network of DTEX Systems Inc. written by Jonathan Daly. Read the original post at:


About Author

Comments are closed.