SABASAI Resources

 
WHITE PAPERS

Why CIOs Need To Beware From Human Errors ?

Today, CIOs are investing considerable e resources in systems that provide them with better

visibility into and real-time reporting on, exactly what is happening

on their IT systems. Performance

monitoring tools such as Compuware Application Performance Management,

CA Performance Monitoring, Nimsoft and many others provide

excellent real-time visibility...

I'm Protected with DLP. Am I ???

ObserveIT vs. DLP Comparison

Forrester estimates that 58% of security data breaches in 2015 involved an insider: a contractor, privileged user or business

user. In the 2015 Data Breach Investigation Report, Verizon estimated that 90% of the

data breaches involved insiders.

While the exact number varies, security professionals are realizing that more focus needs to be put on gaining visibility into what people are doing in order to be able to rapidly detect and respond to risky behavior ...

An Insider Threat Case Study

Rich Malewicz, CIO and CISO of Livingston Country, MI conducted an investigation after some out-of-policy violations were noted by an employee. Recordings made after Malewicz installed the trial version of ObserveIT resulted in the discovery of misconduct and misuse of government property of the employees involved. Ultimately, the video playback from his investigation was utilized as evidence to terminate 4 employees; one of the insiders had been working for the County for 28 years...

Ensuring Security While Maintaining Privacy

Increasingly, companies are monitoring and recording the digital activities of their employees, privileged users and third parties to help protect critical business and

customer data from insider threats. Not surprisingly, this has been met with concern on the part of employees, who fear that monitoring is stepping on their rights to privacy in the workplace...

FEATURES & INTEGRATION
 

ObserveIT Product Brochure

Identify & Eliminate Insider Threats

Insiders are responsible for 90% of security incidents, according to the 2015 Verizon DBIR Report. Of these incidents, 29% are due to deliberate and malicious user actions, while 71% are the result of simple mistakes...

ObserveIT Capability Matrix

The ObserveIT capability matrix details the functionality of the OIT agents on all supported platforms. Cross platform agents may offer varying benefits and experience limitations based on the type of desired deployment model that is chosen...

How ObserveIT integrates with HP Arcsight

Common Event Format Configuration Guide.

COMPLIANCE
 

How ObserveIT Addresses Key Australian Information Security Controls

The Australian Government’s Information Security Manual (September 2012) specifies a wide range of information security governance controls.

This document presents a high-level look at how ObserveIT’s server session recording solution addresses 11 of those controls...

ISO 27001 Monitoring and Audit Logging Compliance with ObserveIT

ISO 27001 specifies a wide range of information security governance controls. This document presents a high-level look at how ObserveIT’s server session recording solution addresses Monitoring and Audit Logging controls. The purpose of this area ...

Do You Need To Demonstrate PCI Compliance?

ObserveIT can help any organization satisfy its PCI requirements within minutes. With detailed logs and visual recordings of all user activity – on any server, workstation or application – ObserveIT exceeds the strictest interpretation of PCI requirements with conclusive evidence for...

 
MEDIA

Five Cyber-security Dangers To Worry About This Week

Published on Aug 20, 2016, -Jason Bloomberg

              

Cyber attacks have become so common that they tend to fade from view. But for head-in-the-sand executives who believe they have better ways of spending their time and money, here’s a wake-up call.

The attacks keep coming. They’re getting more sophisticated. And in spite of all the advancements the cyber-security technology community is making, the bad guys continue... 

Insider Threat Can Be Eliminated With A Proactive Approach

Published on Sep 12, 2016  , -Toby Campbell

              

The media would lead us to believe that the greatest threats faced in today's digital business world are ransomware and ID theft. While they may be right, there is an equally damaging malady lurking right under our noses that is often overlooked - Insider Threats. This article identifies what are insider threats are and looks at some of the mitigation strategies we can us use to address it... (page 18-21)

Insider Threat Can BeEliminated With A Proactive Approach

Published on Aug 14, 2016, -Tony Campbell

              

The media would lead us to believe that the greatest threats faced in today's digital business world are ransomware and ID theft. While they may be right, there is an equally damaging malady lurking right under our noses that is often overlooked - Insider Threats. This article identifies what are insider threats are and looks at some of the mitigation strategies we can us use to address it... 

Poorly Managed Access Rights Are A Breach Waiting To Happen

by Merritt Maxim, April 28, 2015

 

Today’s customer-centric businesses must maximize business agility to adapt quickly to a rapidly evolving marketplace. At the core of any agile business are highly productive and efficient employees who possess the necessary access to key applications and data to do their jobs. However, in their quest to maximize employee productivity, firms are exposing themselves to unnecessary risks... 

Your Critical Missing Security

Vantage Point

Published on Sep 4, 2014

 

Securing company data is proving to be a daunting challenge for IT security teams. Whether it is the dreaded “hacker”, a third party vendor, or a malicious or negligent insider, the threat and potential for data to fall (or be placed) into the wrong hands has never been greater. There are countless methods companies use to protect their data, whether its analyzing log data with SIEM...,

  • LinkedIn Social Icon
  • Twitter Social Icon

Copyright © 2019 - Powered by SABASAI. All Rights Reserved.

 5 Martin Place Sydney 2000, NSW

 +61 2 8005 0564

 

 contact@sabasai.com

APAC HEADQUARTER

SABASAI is pioneered in delivering a unique corporate cyber security approach by integrating best-of-breed solutions from top class vendors along with our own technical expertise and consultancy services. Headquartered in Sydney, Australia, we are active across APAC with our strategic partners & alliances to address the fastest growing risk  - The Insider Threat.

WHO WE ARE

SABASAI

Manage Insider Threats
Eliminate Business Risks