Tackling the insider threat

June 2019 News & Events, Information Security

Secnovate and its strategic partner, Condyn, has run a series of executive briefings on insider threats, which represents a growing and important threat vector for all organisations, big and small.

These executive briefings were held in Johannesburg and Cape Town during mid-April 2019, and hosted by Jorina van Rensburg, CEO of Condyn, Dr Graham Wright, CEO of Secnovate and Sergey Ozhegov, CEO of SearchInform.

Condyn, the Africa office for SearchInform, provides access to the SearchInform Risk Monitor software and services which are designed to assist companies in fulfilling their risk management obligations, facilitate regulatory compliance and investigation processes, prevent corporate fraud, and detect employee abnormal behaviour.

The solution has the capacity to assist organisations in identifying and preventing harmful insider activities, both intentional and negligent, and against loss and leakage of sensitive information, all of which could lead to serious financial losses and damage to reputation.

The multi-dimensional nature of the insider threat solution will impact and assist risk managers, internal auditors and C-level executives as well as information security analysts and compliance officers in fulfilling their respective responsibilities.

Insider threats are possibly the biggest challenge facing today’s corporate risk officer and are often very difficult to detect. These challenges are often exacerbated in times of economic distress and an unstable political and business environment – when employees and insiders are increasingly the target of disruptive syndicates and open to the highest bidder. Employee disaffection and other pressures on these people, which often occupy levels of high trust, are raising the private and public sector risk levels in ways previously not seen.

Statistics from the USA highlighted by Jim Green, CTO of Secnovate, in his presentation at the event illustrated that fraud is the top insider issue companies face (37% of companies were impacted by insider fraud). IT sabotage was the second highest at 21% with espionage coming in at 19%. All of these activities are enabled by insiders, although some have outside influencers.

The SearchInform Risk Monitor is used by more than 2000 clients across 17 countries, with the software installed on over 1.2 million PCs. The solution manages all internal threats to an organisation by controlling the movement of data, data at rest, and employee behaviour. This is an omni-channel protection solution with a secure information perimeter without loopholes.

The solution controls email correspondence, voice and text messages, sent files (Skype, Viber, ICQ, etc.), data loaded/downloaded to/from cloud services, Messages on forums and comments in blogs, external devices (USB, hard drives, CD/DVD disks), and documents sent to print.

The solution is based on two platforms: network and agent. In the case with network platform, the components control traffic at the corporate network level. In the case with agent platform, the components capture the users’ activity at the endpoints and transmit data to the server via the Internet or internal network.

The broad capabilities and attributes of the SearchInform Risk Monitor makes this one of the most comprehensive tools capable of identifying insider threats while these are happening, as well as undertaking forensically sound investigations into incidents. The solution has been used successfully to prevent and investigate many fraudulent and criminal activities some examples of which are provided in the following links: www.securitysa.com/61825n and www.securitysa.com/9179a.

For more information, contact:

• Condyn, [email protected], www.condyn.net

• Secnovate, [email protected], www.secnovate.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Igniting standards, powering protection
Securex South Africa News & Events Fire & Safety
Fire safety is more than compliance, it is a critical commitment to protecting lives, assets, and infrastructure. At Firexpo 2025, taking place from 3 to 5 June at Gallagher Convention Centre, that commitment takes centre stage.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 4 GB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...