classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Dealing with the insider threat
February 2017, Cyber Security, IT infrastructure

The threats to businesses from insiders covers areas such as malware deployment, but also fraud and sharing of company data with unauthorised third parties. When looking at insider incidents, research company Gartner says about 62% of these involve employees looking to establish a second stream of income from their employer’s data, while 29% steal information when they leave to help them in the future. Only 9% are saboteurs.

Protecting your business from threats like these, even simply preventing someone from taking a customer contact list, is not that easy in an environment where data is freely available. Employees often have customer lists, business plans and other sensitive data on mobile devices – laptops, tablets and smartphones – which is reasonable as it can assist them in making sales and servicing customers. But how does a business ensure this data does not end up supporting a competitor’s organisation?

Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system, where employees and data are automatically monitored. The cloud and on-site systems function identically. Moreover, the company is also pushing out a series of behavioural analytics that can identify suspicious behaviours and raise an alert, or even lock down the suspected user.

The employee-monitoring solutions are installed on users’ computers and monitor everything they do, from application usage through to email, even including web-based email offerings like Gmail. Management is able to draw reports and trends of behaviour, while ensuring that specific data is not sent out of the company.

Teramind’s behaviour monitoring application is able to create a baseline of acceptable behaviour for users, highlighting any anomalies and reacting in accordance with company policy – which could allow manual or automatic lockdown in extreme cases. This year will also see the company releasing departmental monitoring, which monitors standard behaviours in departments, again reacting to anomalies as prescribed in the client’s policy.

Administrators are also able to customise their monitoring applications, to exclude Gmail from the monitoring process, for example.

The company is running a pilot site in South Africa and is expanding its reach in the region. Currently, local companies offering the Teramind solution include Telecommunications Solutions (crispin@telecommunicationsolutions.co.za) and infoGuardian (dylan@infoguardian.com)


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trusted Platform Module explained
    May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
  • Procore Trading
    Securex 2017 preview, Cyber Security
    Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...
  • Hikvision launches Blazer Pro
    May 2017, Hikvision South Africa, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Products
    Hikvision has launched Blazer Pro, an all-in-one high-end server solution designed to meet the needs of medium to large camera count, mission-critical surveillance network projects.
  • Fit-for-purpose solar cables
    May 2017, Helukabel SA, Products, IT infrastructure
    Helukabel’s Solarflex-X PV1-F solution for the solar industry is able to withstand the harsh environments of solar plants exceeds TÜV, CE, Rohs and VDE quality certifications to ensure longevity.
  • Security skills shortage?
    May 2017, Galix Networking, Cyber Security
    We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.
  • Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
    May 2017, Vision Catcher, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
  • Network cameras can improve smart city living
    May 2017, Axis Communications SA, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
    It is time to think outside the traditional security box and find new application areas where network cameras have the potential to make a significant difference to the quality of urban living.
  • IoT running wild compromises security
    May 2017, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.
  • Are you afraid of the dark (net)?
    May 2017, J2 Software, This Week's Editor's Pick, Cyber Security
    Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.
  • Accelerating the community theme
    May 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News
    Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.
  • Securing your security
    April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
    The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.
  • Wireless works for CCTV
    April 2017, MiRO Distribution, RADWIN, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.