identity-intelligence-logo

Identity Intelligence

Identity Intelligence Technology

Closing Security Gaps Through Automation

While most security teams are focused on preventing malicious outsider attacks, recent data suggest that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, IT and OT systems make it difficult for security teams to detect and prevent insider threats.

Relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence, is now the most practical and human error-proof solution today.

Automation marks the difference between engaging in a recipe for failure and loosening your dependency on luck.

UNIFIED IDENTITY PROFILE ENABLES INTELLIGENT DECISION MAKING

  • Incorporate risk scoring and behavior patterns into an Identity profile
  • Visibility across IT, Physical and OT assets allowing for real-time usage pattern analysis
  • PRA, Background and Training checks embedded into a risk score and profile leveraged for access control, granting and reporting activities
  • Behavior patterns allow for actionable intelligence to minimize the risk profile to the environment

AI-POWERED AUTOMATION

  • Dramatically reduces the time and cost for detecting and resolving risk
  • Automated threat protection across IT, Physical and Operational systems from one place
  • Machine learning automatically baselines identity profiles
  • Sorts through millions of events in minutes
  • Detects potential malicious behavior anomalies, policy violations and trends that would otherwise go unnoticed

SITUATIONAL INTELLIGENCE

  • Seamless integration with Enterprise Sentry for investigations
  • Delivers a clear view of what’s happening across an enterprise
  • Provides context and awareness of correlated events
  • Empowers Security Operation center personnel to make informed decisions and respond appropriately

TURN DATA INTO INSIGHTS

  • Powerful dashboards
  • Identity profile risk scores
  • Conduct proactive risk analysis before provisioning or removing access
  • Patented rules-based active policy enforcement engine automatically identifies policy violations and unauthorized access
  • Allows security managers to proactively monitor and respond

RISK PROFILES

  • Maintain identity profiles for your workforce
  • Automate the background check, criminal history and other vetting procedures
  • Maintain anonymized workforce access and behavior profiles
  • Generate security alerts for access attempts outside normal shift hours or systems not normally accessed
  • Identify and respond to suspicious behavior, security violations, as well as operational and procedural issues

INVESTIGATE HIGH RISK CASES WITH ENTERPRISE SENTRY

The Identity Intelligence Dashboard and Risk Profile functions work seamlessly with Enterprise Sentry to identify and provide the tools necessary to investigate high risk cases across the entire organization.

AIRPORT USE CASE

IDENTITY INTELLIGENCE FEATURE AND BENEFITS

  • Comprehensive and thorough prevention of Insider Threats
  • Maintain an identity profile for every employee and contractor and automate the background check, criminal history and all other vetting procedures
  • Each individual identity profile is assigned a risk score based on job role, access to critical assets, areas and information
  • Introduces risk management into the business and security process
  • Ability to conduct risk analysis prior to provisioning access
  • Maintain anonymized access and behavior profiles for staff
  • Generate security alerts for access attempts outside normal shift hours, or systems not normally accessed
  • Automatically enforce policies with access to classified information
  • Only allow access when physically present in a SCIF or other secured facilities
  • Active Policy Enforcement delivers true security
  • Reduction in time and cost for detecting and resolving risk
ds-identity-intelligence-covid-icon-white

New COVID-19 Health & Safety Access Governance AND INTELLIGENCE MODULES

As attention turns to restarting and recovering the global economy, AlertEnterprise is helping organizations put technology to work to defend their workforces from the COVID-19 contagion. The new Health & Safety Access Governance and Intelligence modules helps you return to work with confidence, automating and proactively enforcing policies and plans for re-entry, workspace physical distancing and infection response.