Teramind
Teramind
Teramind UAM
Activity Monitoring, User Behavior Analytics, Productivity Optimization & Insider Threat Detection in a Single Platform
Teramind Comes with Powerful User & Entity Behavior Analytics Capabilities
Teramind UAM features user and entity behavior analytics (UEBA) capabilities to identify and alert the organization to a wide-range of anomalous behavior and potential threats by either a malicious, inadvertent or compromised employee, user or third-party entity.
Teramind automatically creates a behavioral baseline taking into account a user’s activity (i.e. how many times a user accessed a file), data pattern (file type, source, category etc.), entity role (application, access level, domain etc.) and other attributes (i.e. time of day, schedule, assigned project). Any anomaly or deviation from the normal baseline can then trigger real-time alerts and notification.
Teramind’s Intelligent Policy & Rules Engine then combines this UEBA capability to proactively prevent insider threats while providing the organizations with a clear and complete picture of all user & entity activity, context and forensic evidence in a single solution.
Teramind User Activity Monitoring Overview
Industry Statistics Prove the Need for Activity Monitoring
Colluding Employees are the Sources of Insider Threats | |
According to the Community Emergency Response Team, the main reasons for insider caused incidents are collusion from employees and third-parties. | |
48.3% |
Insider-Insider Collusion |
16.75% |
Insider-Outsider Collusion |
Employee Privilege Puts Sensitive Data at Risk | |
According to a survey of 400,000 member online by Cybersecurity Insiders published on The Insider Threat 2018 report. | |
37% |
Excess Privilege |
34% |
Increased Amount of Sensitive Data |
Employees are a Major Security Concern | |
Businesses agree employees are their biggest weakness in IT security - according to Kaspersky Lab and B2B International study of over 5,000 businesses. | |
52% |
of Businesses Agree Employees are Biggest Risk |
Many Employees Spend Unproductive Time at Work | |
According to FinancesOnline, 64% of employees use non-work related worksites every day and 85% of employees use their email for personal reasons. | |
64% |
Browse Unproductive Sites |
85% |
Use Email for Personal Tasks |
Teramind UAM Delivers Immediate Business Benefits
|
Establish Organization-Wide Visibility and ControlTeramind visually records every action that an employee makes for over 12 objects including screen, apps, websites, files, emails, etc. Each object can be configured to take into consideration what needs to be monitored and measured and who has access to the monitored records. You can control which employees or third-party vendors to monitor, how much you want to monitor, when and for how long. This allows for both instant administrative viewing and respect employee privacy requirements as needed. |
|
Detect Insider Threats and VulnerabilitiesFirst, determine what behaviors are high risk i.e. copying files to external drives, using cloud storage to share corporate files, downloading/opening files and attachments from unknown sources etc. Then, apply advanced behavior-based rules to automatically detect when employees violate the rules. Utilize sophisticated anomaly rules to identify employee activity outside the normal behavior. Immediately get notified about harmful employee activity, lock them out from the system or take remote control of their computer before any malicious or fraudulent attempt. |
|
Protect Your Sensitive Data and ResourcesTake a look at Teramind DLP if you need a dedicated data loss prevention solution. However, Teramind UAM comes with some useful data protection features too. For example, you can utilize the Activity and Schedule-based rules to prevent external drive usage, detect unusual or unauthorized network login or files transfers. Or, write rules that react to any observable employee activity like blocking an e-mail from being sent outside the company domain, receive instant notification when certain sensitive document gets printed etc. All these features can help minimize information exfiltration and data leaks by malicious or ignorant employees. |
|
Boost Employee Productivity and PerformanceUse the workforce productivity tools to track active vs inactive time, late shifts, long breaks etc. Design etiquette rules to limit unproductive behavior. For example, set a time limit on social media usage or restrict access to gambling sites. |
|
Monitor Privileged Employees and Third-Party VendorsTeramind allows organizations to stop potential employee-employee or employee-third party collusion attempts. Create profiles for remote, privileged, external vendors and then define what information and system resources each profile can access. Further rules can be set up by behavior policies so that access to sensitive information is segregated by the organization’s security policy, or on a need-to-know basis. Rules can also be created to notify the authorities of any suspicious privileged employee and third-party vendor activity, such as unscheduled and/or unauthorized changes to system configuration, creation of backdoor accounts etc. |
|
Reduce Organizational Risk and Protect Yourself with ProofTake action against a malicious employee backed by solid proof. On Teramind, you can view detailed reports for all employees including any security incidents and what steps were taken. Instant snapshots, session recordings and history playback features can be used to view employees desktop for audit and evidence gathering purposes. Video and audio recording can be exported and shared with law enforcement authority. |
|
Project Management BenefitsUse the Revealed agent to let employees, contractors or vendors identify and track what projects/tasks they're working on or use the Hidden agent to automatically assign tasks to employees based on their apps/web activity. Use built-in scheduler to track attendance; receive alerts when employees deviate from their scheduled work hours. Timesheet and cost tracking reduce the need for manual invoicing and oversight when working with contractors or remote workers. |
|
HR Management BenefitsHR departments can use Teramind to provide a safe work environment by monitoring internal communication channels for harassment, abuse, resentment. For example, you can create a rule to detect keywords that shows angry sentiment and take proactive measures before it escalates into a conflict. Use etiquette rules to govern acceptable usage policy and code of conduct. |
Flexible Deployment Options
On-premise - control the Teramind implementation in its entirety, stay off-cloud if that’s your firm’s operational model, leverage LDAP groups and users to identify which users and groups to apply which policies and rules to.
Teramind Private Cloud - use your own secure, scalable private cloud implementation including AWS, Google Cloud, Azure and more.
Teramind Cloud - trust us the management of the Teramind deployment and infrastructure. Only install Teramind Agents on the machines you want to monitor and set up your users, policies and rules and let us take care of the rest.
Looking for a data loss prevention solution instead?
One with user activity monitoring built-in?
Teramind also offers Teramind DLP, an endpoint data loss prevention solution with advanced features such as OCR, fingerprinting and content discovery to prevent malicious or negligent data exfiltration, data breaches and IP loss. Check out the video below to see how these two solutions compare: