defending-against-insider-threat-showcas
See Who Is Targeting Your Organisation

What is a User Threat Assessment?


Majority of organisations have no idea that their insiders are exposing their business to possibly risk.

A User Threat Assessment will provide you with the visibility and analytics allowing you to understand where your data is living, how your users interact with it, and where and how it’s walking out the door of your organisation. You’ll also be able to get an understanding of how users behave both on and off the corporate network. This knowledge is invaluable when it comes to gaining a general baseline understanding of your organisation. Such an assesment will show you whether your organisation is meeting or falling short of regulatory compliance.

We provide organisations with the visibility and insights they need to understand how users interact with company assets fully. Without this assessment, you are flying blind. With the right visibility, you can then make the right informed decisions.



Visibility doesn’t come at the expense of privacy!

This assesment doesn't violate any corporate regulation or employees privacy
The information collected is in the form of metadata. This metadata can go through an optional anonymisation process to strip out all identifying user information.

As a result, privacy-compliant, even under some of the strictest privacy laws in the world, is assured

Your Guarantee

We promise 100% of Threat Assessments finds some form of undetected, unaddressed security threat. If we fail to identify such security threat, not only do we NOT charge you for this service, but we will contrinute $1,000 to your nominated charity.

First Hour.png

FIRST HOUR

On-premiss or cloud

deployment

First 24 hours.png

FIRST DAY

High-Risk Activity

Alerting

Fiorst Quarter.jpg

FIRST QUARTER

Anomaly Detection from Baseline

answers.png

Expert Analysis

Your tailored assesment and findings report

How Does It work?

We will deploy an invisible lightweight data collector on your nominated systems and  deliver undisputble visibility in days.With zero impact on system performance it collects only 3-4 MB of data per day, with minimum network impact and totally transparent to your employees

User Threat Assessments that deliver the most insightful results, typically include the largest possible assessment group.

We recommend that this assessment group be a cross-sample representation of the organisation to get the most accurate results and value.      

 

 

 

 

 

 

At the end of the Assesment we will presnt you with a summary of each key finding by risky activity:

 

  • Details about the number of users engaging in each risky activity

  • Threat severity ratings

  • Details about the user population included in the User Threat AssessmenT