11
Veriato Overview

Veriato 360 employee monitoring software! (企業稽核+行為分析+證據保全方案)

Embed Size (px)

Citation preview

Page 1: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Veriato

Overview

Page 2: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

… is an innovator in actionable User Behavior

Analytics and the global leader

in User Activity Monitoring.

Our solutions are deployed in 110+ countries, and more than 36,000 organizations have trusted us to help

Headquartered in Florida

Backed by respected Private Equity firms

HarbourVest and Westview Capital

Veriato …

Page 3: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Veriato provides

User Behavior Analytics

• Detection of insider threats

• Patterns of human behavior

• Algorithms and statistical analysis to

detect meaningful anomalies – indications

of potential threat

User Activity Monitoring

• Detailed & contextual user activity log

• Alerts, reports, playback, and search

• Collection of data focused on the point of

interaction between user and resource

Page 4: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Why are these needed?

Employee Investigations Insider Threat Detection Productivity Monitoring

Page 5: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

The Recorder

Email sent/received Document tracking

File transfers

Network usage

Keystrokes typed

User Status

Applications used

Websites visited & web searches

Chat & IM

Online searches

Screen activity / inactivity

Page 6: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Veriato Recon • User Behavior Analytics solution • Insider threat detection & deterrence • Covers lower risk and higher risk insiders • Learns what normal patterns of behavior exist within an organization and watches for anomalies that suggest threat to data security • Alerts when meaningful anomalies detected – integrates with leading SIEMs and / or can directly alert appropriate company staff • Designed to be highly usable without lengthy tuning periods and expensive professional services • Stores the underlying user activity data securely and temporarily • Tightly integrated with Veriato 360

Page 7: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Veriato 360 • User Activity Monitoring • Comprehensive, enterprise-class • Covers higher risk insiders, vital tool for incident response and used for productivity monitoring • Detailed contextual visibility of employee activity (individual or aggregate) • Records activity, alerts on actions • Numerous review options: dashboards, reports, video-style playback • Tightly integrated with Veriato Recon

Page 8: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Veriato Investigator • Employee Investigation Software • A simplified, lightweight User Activity Monitoring solution • Designed for temporary, focused investigations • Detailed contextual visibility of employee activity (individual) • Records activity • Video-style playback • Data is easily exportable for use in decision support and, when needed, legal proceedings

Page 9: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

Privacy Legal Data Storage Performance Numerous options enable a balance between corporate security concerns and employee privacy considerations • Do not record options • Levels of review • Alerts & auditing Active and passive monitoring options to meet your goals

Disclose that you monitor (likely already doing this) Align your monitoring profiles to your goals Keep out of personal lives whenever possible

Typical recording requires ~10MBs per day, including screenshots Data secured using AES encryption Robust access controls on database Dedicated/isolated SQL instance Recon data stored in obfuscated proprietary files on local machines

Millions of agents deployed; deployments range from 10—10,000+ Very minimal impact on client machine, if any—typically indiscernible Data pushed across network in small (+/- 200kb) bursts to minimize bandwidth consumption

Elephants In The Room

Visibility Stealth mode – designed to be undetectable More customers choose Stealth mode – most appropriate for investigations & unmodified behavior analysis Stealth necessitates some AV work upfront Visible mode – system tray icon Deterrent effect

Page 10: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

PROBLEMWithout accurate information, making good decisions is difficult at best. Not all of the information needed to make the right call is easy to see; organizations typically piece together clues from a multitude of disparate sources in an attempt to assemble a complete picture of what is happening within. Not having a definitive record of the digital activity occurring in your organization leaves you vulnerable to insider threats, increases your litigation risk, and prevents you from improving operational efficiency and maximizing productivity.

SOLUTIONCollecting data on employee digital activity addresses these problems head on. From early detection of fraud and other insider threats, through more efficient and effective investigations, termination protection, and reduction of HR related risks, to base lining in support of establishing best practices and improving training programs, having visibility into the online and communications fabrics of your organization gives you the information you need to support your corporate goals and objectives.

WHAT’S NEWVeriato 360 8.4 adds 9 new out-of-box templates designed to help companies quickly detect & deal with pressing issues like fraud, data theft, insider risk stemming from privileged users, HR policy violations, and more. In addition, new capabilities around recording activity related to personal clouds like Drop Box and Google Drive are included to help companies better detect and deter IP theft and data leaks.

Organizations worldwide use Veriato 360 to protect their assets; monitor highly privileged users; reduce litigation risk and expense; improve efficiency and productivity, and ensure compliance with company policies. Veriato 360 is a comprehensive user activity monitoring solution that enables companies to log, retain, review, and report on employee activity when there is cause to do so. Veriato 360 creates a definitive record of an employee’s digital behavior, and in doing so provides organizations with the ability to see the context of user actions. Which translates into the answers you need, without high false positive rates, in one easy to use package.

KEY BENEFITSPRIVILEGED USER MONITORINGHighly privileged users (or “super users”) have a disproportionate ability to harm an organization, because of the level of access they have been granted to. By monitoring their activity, you can ensure that the access they’ve been granted is not used improperly. There is no greater risk than a highly privileged user gone rogue.

INTELLECTUAL PROPERTY AND CORPORATE DATA PROTECTIONEmployees leaving the organization take IP with them when they leave.1 out of 2 employees surveyed think it is OK to do so. If you are not actively monitoring the activity of employees during this high risk exit period, you are letting your IP and sensitive data (like customer contacts) leave with them.

IMPROVING OPERATIONAL EFFICIENCY AND EFFECTIVENESSBenchmark the activities of top performing employees and departments to identify training opportunities and best practices. Make sure the tools and processes you’ve invested in are being used. Identify the top “time drains” in your organization and implement changes to maximize productivity. KNOW WHAT YOU NEED TO, WHEN YOU NEED TO KNOWLever powerful alerting and reporting capabilities to put the answers you need in easy-to-create, easy-to-understand forms. No digging through myriad sources of data; no cobbling together reports. More than 75 out of the box reports, and the ability to create custom reports with just a few clicks.

Veriato 360®

THE VISIBILITY YOU NEED – A SOLUTION THOUSANDS OF COMPANIES TRUST

www.veriato.com

Page 11: Veriato 360   employee monitoring software! (企業稽核+行為分析+證據保全方案)

ADDITIONAL FEATURESINTELLIGENT ACTIVITY DRILL-DOWNVeriato 360 allows you to quickly find the action in question, so you can spend your time addressing risks impacting the business instead of looking through tens of thousands of actions in a single day.

ANY DESKTOP, ANYWHEREVeriato 360 can record activity whether the user is working on a physical or published desktop, a hosted application, or on a virtual machine.

SCREEN PLAYBACKVeriato 360 can capture actual screen snapshots, enabling you to replay computer-based actions tied to activity data within context, before, during and after an event.

LICENSINGVeriato 360 is licensed by monitored end point. Veriato 360 licenses are perpetual. For companies that wish to move licenses around to different monitored end points (commonly found in investigative use cases) Veriato 360 Floating licenses are available.

SYSTEM REQUIREMENTSRecorder (for computers & laptops being monitored)• Windows® 8, Windows® 7, Windows Server 2012, Windows Server® 2008• Mac OS® X 10.9 or higher running on a 64-bit Intel processor• Network Access (Networked on a Windows Domain, Workgroup, or Novell® Network)• Administrator share level access to computer for remote installation Control Center

Control Center• Windows 8, Windows 7, Windows Server 2012, Windows Server 2008• Network access to servers, database, PCs, and Macs monitored

Dashboard• Windows 8, Windows 7, Windows Server 2012, Windows Server 2008• Network access to the Veriato 360 SQL instance• Windows login or login privileges to the Database

Server Components• Windows operating system, x32 or x64:• Windows Server 2012• Windows Server 2008• Windows Server 2003• Windows 8• Windows 7• Enterprise class server (Pentium® III / Intel® Xeon®, 8 GB RAM) is recommended for ongoing use, but any newer Windows system is appropriate for evaluation º SQL Server Host Server—OS in native English º SQL Server Host Server—NTFS file system (not FAT32) º Static IP address is recommended º 40 GB free disk space

KEY FEATURESDETAILED RECORDING OF DIGITAL ACTIVITY

POWERFUL EMPLOYEE PRIVACY PROTECTIONSThough it may seem counter-intuitive, Veriato 360 contains numerous options to maximize the privacy of your employees. From the simple (not recording activity on personal banking sites) to the more complex (masking passwords and user names), Veriato 360 enables you to balance employee privacy and the needs of the organization.

SECURE STORAGEAll data collected is written to an on–premises SQL database that uses a proprietary database schema. Object level encryption using AES or 3DES ensures the data remains secure.

ACTIVE TIME, FOCUS TIMEVeriato 360 distinguishes between active time and focus time – so you can know whether an application or website was opened and left idle, or being actively interacted with. This is critical to accurately assessing productivity, and eliminates any questions about what was done, and when.

©2016 Veriato. All rights reserved. Veriato and the Veriato logo are among the trademarks or registered trademarks owned by Veriato Corporation. All other marks are the property of their respective owners.

www.veriato.com

Veriato monitors, captures and analyzes all user activity...

ABOUT VERIATOVeriato is an innovator in actionable User Behavior Analytics and the global leader in User Activity Monitoring. More than 36,000 companies, schools, and government entities worldwide have relied on Veriato solutions to gain insight into the user activity on their network, and enjoy the security and productivity increases that come with it. The Veriato mission is to provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations. Veriato’s award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection), Veriato 360 (enterprise-grade User Activity Monitoring), Veriato Investigator (employee investigation tool), Veriato Log Manager (event and security log management) and Veriato Server Manager (server management solution).

Go to www.veriato.com for a Free Trial or email us at: [email protected]