classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Dealing with the insider threat
February 2017, Cyber Security, IT infrastructure

The threats to businesses from insiders covers areas such as malware deployment, but also fraud and sharing of company data with unauthorised third parties. When looking at insider incidents, research company Gartner says about 62% of these involve employees looking to establish a second stream of income from their employer’s data, while 29% steal information when they leave to help them in the future. Only 9% are saboteurs.

Protecting your business from threats like these, even simply preventing someone from taking a customer contact list, is not that easy in an environment where data is freely available. Employees often have customer lists, business plans and other sensitive data on mobile devices – laptops, tablets and smartphones – which is reasonable as it can assist them in making sales and servicing customers. But how does a business ensure this data does not end up supporting a competitor’s organisation?

Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system, where employees and data are automatically monitored. The cloud and on-site systems function identically. Moreover, the company is also pushing out a series of behavioural analytics that can identify suspicious behaviours and raise an alert, or even lock down the suspected user.

The employee-monitoring solutions are installed on users’ computers and monitor everything they do, from application usage through to email, even including web-based email offerings like Gmail. Management is able to draw reports and trends of behaviour, while ensuring that specific data is not sent out of the company.

Teramind’s behaviour monitoring application is able to create a baseline of acceptable behaviour for users, highlighting any anomalies and reacting in accordance with company policy – which could allow manual or automatic lockdown in extreme cases. This year will also see the company releasing departmental monitoring, which monitors standard behaviours in departments, again reacting to anomalies as prescribed in the client’s policy.

Administrators are also able to customise their monitoring applications, to exclude Gmail from the monitoring process, for example.

The company is running a pilot site in South Africa and is expanding its reach in the region. Currently, local companies offering the Teramind solution include Telecommunications Solutions (crispin@telecommunicationsolutions.co.za) and infoGuardian (dylan@infoguardian.com)


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Authlogics appoints AxizWorkgroup as a distributor in Africa
    February 2017, News, Cyber Security, IT infrastructure
    Multi-factor authentication company Authlogics has announced that AxizWorkgroup is its first local distributor and will deliver authentication solutions to resellers in Africa.
  • Integrated infrastructure solution for financial services firm
    February 2017, BT-SA, Integrated Solutions, IT infrastructure
    BT-SA recently completed the installation of an all-inclusive infrastructure solution for a major client’s new administration building and workshop.
  • Eyes open in the bus
    February 2017, Hikvision South Africa, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Products
    Rosario, Argentina has undertaken a citizen-focused security project to implement surveillance cameras on public buses.
  • Wireless policing in Namibia
    February 2017, RADWIN, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Police replace Wi-Fi network with Radwin’s wireless broadband access solutions to ensure highest quality video surveillance transmission.
  • South African smart cities
    February 2017, RADWIN, Integrated Solutions, IT infrastructure
    When one thinks of smart cities, one might be forgiven for overlooking Africa, but not for much longer as the technology is in play and expanding rapidly.
  • Protection from ransomware
    February 2017, Cyber Security, IT infrastructure
    With some careful preparation, you can significantly lower your risk of being infected by ransomware, and reduce the impact if you are hit.
  • Defining African communications
    February 2017, Technews Publishing, Cyber Security, IT infrastructure
    Hi-Tech Security Solutions was present at AfricaCom to witness the vast resources being poured into improving the communications capabilities of the continent.
  • Control cables with numbered cores
    February 2017, Helukabel SA, Products, IT infrastructure
    Equipment and machinery installations using the latest cabling ­technologies can contribute significantly to the ease of installation and overall success of a project.
  • Clues are dead
    February 2017, News, Cyber Security
    Kaspersky Lab’s discovery in 2016 of an APT able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a reliable means of detecting infection.
  • Tough with opportunities
    February 2017, Security & Communication Warehouse, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Marius Stoop looks at what we can expect in the security industry in 2017.
  • Cyber security in 2017
    February 2017, Cyber Security
    Harish Chib, VP MEA for SOPHOS discusses some of the cyber security issues he expects to encounter in 2017.
  • Security versus convenient access
    November 2016, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    As digital interactions increase in volume and complexity, identity and access security have become more critical for both the organisation and end-user.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.