What is a User Threat Assessment?
Majority of organisations have no idea that their insiders are exposing their business to possibly risk.
A User Threat Assessment will provide you with the visibility and analytics allowing you to understand where your data is living, how your users interact with it, and where and how it’s walking out the door of your organisation. You’ll also be able to get an understanding of how users behave both on and off the corporate network. This knowledge is invaluable when it comes to gaining a general baseline understanding of your organisation. Such an assesment will show you whether your organisation is meeting or falling short of regulatory compliance.
We provide organisations with the visibility and insights they need to understand how users interact with company assets fully. Without this assessment, you are flying blind. With the right visibility, you can then make the right informed decisions.
Visibility doesn’t come at the expense of privacy!
This assesment doesn't violate any corporate regulation or employees privacy
The information collected is in the form of metadata. This metadata can go through an optional anonymisation process to strip out all identifying user information.
As a result, privacy-compliant, even under some of the strictest privacy laws in the world, is assured
We promise 100% of Threat Assessments finds some form of undetected, unaddressed security threat. If we fail to identify such security threat, not only do we NOT charge you for this service, but we will contrinute $1,000 to your nominated charity.
On-premiss or cloud
Anomaly Detection from Baseline
Your tailored assesment and findings report
How Does It work?
We will deploy an invisible lightweight data collector on your nominated systems and deliver undisputble visibility in days.With zero impact on system performance it collects only 3-4 MB of data per day, with minimum network impact and totally transparent to your employees
User Threat Assessments that deliver the most insightful results, typically include the largest possible assessment group.
We recommend that this assessment group be a cross-sample representation of the organisation to get the most accurate results and value.
At the end of the Assesment we will presnt you with a summary of each key finding by risky activity:
Details about the number of users engaging in each risky activity
Threat severity ratings
Details about the user population included in the User Threat AssessmenT