Security from the Inside

Similar documents
Ekran System v Program Overview

Ekran System v Program Overview

vrealize Operations Management Pack for NSX for Multi-Hypervisor

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

PCI DSS Compliance. White Paper Parallels Remote Application Server

Cisco Tetration Analytics

HySecure Quick Start Guide. HySecure 5.0

ALERT LOGIC LOG MANAGER & LOG REVIEW

IBM Internet Security Systems Proventia Management SiteProtector

McAfee MVISION Mobile epo Extension Product Guide

UX - User Experience: Multi-Cloud Network Visibility

4 Ways Your Organization Can Be Hacked

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

SentinelOne Technical Brief

WHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users.

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Netwrix Auditor for SQL Server

SOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

SeeTest Quality Assurance Platform On-premise Digital Assurance Lab

SentinelOne Technical Brief

Tetration Hands-on Lab from Deployment to Operations Support

On-Premises v7.x Installation Guide

Get to know SysKit Monitor

Cloud Security Whitepaper

PANORAMA. Figure 1: Panorama deployment

OBSERVEIT TECHNICAL SOLUTION OVERVIEW

SysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)

Best Practices in Securing a Multicloud World

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

EXPLORING MONITORING AND ANALYTICS VMware Horizon

Goliath Application Availability Monitor. Technology Overview

ForeScout Extended Module for VMware AirWatch MDM

Tableau Server Platform Monitoring

RSA pro VMware. David Matějů. RSA, The Security Division of EMC

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

enteliweb Software: Enterprise Facility and Energy Management

Paperspace. Deployment Guide. Cloud VDI. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper

A10 HARMONY CONTROLLER

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

ForeScout Extended Module for Carbon Black

Cisco Tetration Analytics

EXTENDING BEHAVIORAL INSIGHTS INTO RISK-ADAPTIVE PROTECTION & ENFORCEMENT

PROTECT AND AUDIT SENSITIVE DATA

SYMANTEC DATA CENTER SECURITY

Hystax Acura. Cloud Migration and Disaster Recovery Solution. Hystax. All rights reserved. 1

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Goliath for NetScaler Frequently Asked Questions

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Understand & Prepare for EU GDPR Requirements

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Imperva Incapsula Website Security

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

Security in the Privileged Remote Access Appliance

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

vrealize Operations Management Pack for NSX for vsphere 2.0

PROXY Pro Web Console Operations v10.0. User Guide October 2017

SkyFormation for Salesforce. Cloud Connector

Detector Service Delivery System (SDS) Version 3.0

Netwrix Auditor. Administration Guide. Version: /31/2017

McAfee Endpoint Threat Defense and Response Family

Sponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam

CYBER SECURITY WHITEPAPER

The Evolution of Data Center Security, Risk and Compliance

On line Thermal Performance Monitoring System. Annexure B1. IEC IT Compliance & Cyber Security Requirements

The professional IT management platform

vcenter Operations Management Pack for NSX-vSphere

Encapto WiFi OVERVIEW

Enterprise Security Solutions by Quick Heal. Seqrite.

PowerBroker Password Safe Version 6.6

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE

Introduction to Cloud Computing

Quick Heal Mobile Device Management. Available on

Cisco Network Admission Control (NAC) Solution

McAfee Public Cloud Server Security Suite

McAfee Skyhigh Security Cloud for Amazon Web Services

Goliath Logon Simulator for Citrix Frequently Asked Questions

Interaction Center Business Manager Supervisor Functions

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

User Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc.

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Privileged Remote Access Jumpoint Guide

enteliweb Software: Enterprise Facility and Energy Management

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

Table of Contents HOL-SDC-1317

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

1 Introduction Requirements Architecture Feature List... 4

Technical Overview. Jack Smith Sr. Solutions Architect

All Events. One Platform.

Supporting ios Devices

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

Cisco Next Generation Firewall Services


CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Cloud FastPath: Highly Secure Data Transfer

Transcription:

Security from the Inside Detect, Record, and Eliminate Malicious User Behavior 24/7 live screen recording & playback Automatically allow or block any activity Real-time user activity tracking Rule-based Risk Analysis Automated alerts Flexible and comprehensive reporting Time and productivity analysis Robust cloud or on-premise deployment Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

What problems do we solve? Insider Threat Detection and Prevention Teramind uses an intelligent, lightweight agent to collect and react to users activity in real-time. Configure Teramind to automatically raise an alert, block an action, or lock out a user for any observable behavior. Stop emails from being sent, block uploads to certain websites, get alerted when a user chats with a specific counterparty, and much more. Employee Monitoring and Policy Enforcement Use Teramind to gain collective or individual insight into user behavior. Our platform collects all PC user activity and displays all data via intuitive, web-based dashboard with drill-down capabilities. View the user s screen in real-time, see the content of printed documents, analyze time spent on a certain website, and much more. Configure Teramind to enforce your company s security and use-policy by defining allowed and disallowed activities. Specify when to stop monitoring to protect your users privacy. Session Recording Whether for compliance or paper trail - our session recording capability is second-to-none. Teramind records a live desktop stream which resembles a video of the session. We support standalone machines, RDS, and Citrix environments. Privileged User Monitoring Deploy Teramind to track and protect from remote vendors and privileged users. Allow admins to login only during permitted hours or allow them to login only when you approve an exception request. Use Teramind to prevent administrators from writing to certain files, installing new software, and more despite having special privileges.

Visual Screen Recording Watch multiple users simultaneously Take a snapshot, or export a clip to AVI Watch historic recordings by setting a time range Take control of users desktops Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

User Activity Tracking Incoming & outgoing e-mails File transfer & removable media insertion Applications running Websites visited Keystrokes Chats Search engine queries Printed documents

Prevention and Notification Define custom actions for unwanted or high risk behavior. Create simple or complex rules based on anything that Teramind monitors. For example: If a user tries to sends an e-mail to your@competitor.com, block the e-mail Lock out the user when they try to copy a file from \\PRIVATE\ to a USB drive Limit Facebook use to 15 minutes a day, then block Prevent remote vendors from logging in off-hours, or launching a program unrelated to their work Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

Privacy Protection Teramind understands the need to protect user privacy and comply with local monitoring laws. Use our tracking profile capability to bucket users into detailed monitoring profiles. Enable or disable any monitoring feature, based on any criteria, for example: By website: If the user is accessing their personal bank, stop keystroke and screen recording. By application: Do not capture screen nor keystrokes when the user is in Skype. By day and time: Monitor only during work hours. In addition, you can ask Teramind to issue a license key with monitoring features deliberately and permanently disabled.

Offline Recording & Enforcement When a computer loses connectivity for any reason, Teramind continues to record locally until the connection is reestablished. Automated rules continue to be enforced based on the last connection s profile. Once reconnected to the server, the agent sends the backlog at a throttled pace, and no data loss occurs. Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

Productivity Analysis See who's performing and who's not, based on your metrics, or built-in statistics gathered from monitoring. Generate productivity reports for users or departments. See what hours your employees are most productive. Optimize your payroll expenditure for maximum output

Rule-Based Risk Analysis Risk exposure snapshot of an entire organization Rules can be defined for any observable activity & set to proactively block any behavior A reaction could be to block the action, lock out the user, notify the administrator, or simply warn the user and educate them to follow your organization s policy. Risk levels can be assigned to each rule and risk scores by department, by user, or by rule level Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

Deploy Teramind Anywhere In Your Data Center The Teramind server is an all-inclusive Virtual Appliance that can be deployed to your existing VMWare, Hyper-V, or Xen environment. No other licenses are required to run the server. A single, adequately spec d server can handle above 2,000 concurrent sessions Scale up by running multiple servers in parallel In Your Private Cloud Run Teramind directly in your AWS account Leverage Amazon s legendary scalability and redundancy framework On Our Hosted Solution Get started in minutes. No server installation nor maintenance required. Simply install the agents and you re ready to go. Leave scaling to us. The Teramind Cloud can scale without bounds.

Technical Specifications: Server Architecture: Self-contained, Linux-based virtual appliance that runs on VMWare, Hyper-V, or Xen. Storage: Approx. 1gb per 160 hours of data and screen at full-quality and color, or 350 hours of black & white and 70% scale Bandwidth: Average 10kbps upstream (agent to server), depending on user activity level, and number of screens. Load: Up to 500 concurrent users: 4 cores, 8gb 1000 concurrent users: 6 cores, 12gb 2000 concurrent users: 12 cores, 16gb Dashboard: Web-based, mobile-friendly Updates: Single file released periodically gets uploaded to the dashboard via browser. Integrations: Export data to your SIEM via syslog LDAP Published REST-based API

Technical Specifications: Agent Windows 7 (32-bit / 64-bit) Windows 8 (32-bit / 64-bit) Windows 10 (32-bit / 64-bit) Windows Server 2008 and 2008 R2 Windows Server 2012 and 2012 R2 Supported Platforms: Sessions: Stand-alone Citrix RDS Load: Approx. 30mb memory and 1-3% CPU, depending on user activity Visibility: Hidden or revealed agents available Deployment: Connectivity: Consumes an average of 10kbps upstream to the Teramind server, based on user activity and number of screens Saves data locally when disconnected Manual installation (.msi) Group policy Remote installation Silent install option

Some of our Customers Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co

About Teramind Teramind provides a user-centric security approach to monitor employee behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Teramind provides both cloud-based and on-premise deployment options to meet your organization s requirements. Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co