SlideShare a Scribd company logo
Over 1,400 Customers Worldwide
ObserveIT is the Global Leader in
Identifying & Eliminating Insider Threats
2016
Innovation
Award
ObserveIT 6.7 Release Highlights
November 2016
Speakers
Kevin Donovan
Solutions Architect
ITPM
Michael Gordover
Solutions Architect
(ISC)² Associate CISSP,
ITPM
John Vigeant
VP Sales, Americas
Insider Threat is a Big Problem
3
90%
of security incidents are caused by people
58%
of breaches are caused from
internal incidents or with a
business partner’s organization
55% of attacks are originated by an insider
Source: Verizon 2015 Data Breach Investigations Report Forrester’s Global Business Teechnographics Security Survey 2015 2015 IBM Cyber Security Intelligence Index
The Challenge: Visibility & Privacy
4
Data exfiltration (USB, printing, web)
Granting / elevating access privileges
Unauthorized software access, downloads
Questionable web activities (dark web,
gambling)
… and all must meet regulatory compliance standards
Before 5.0
User Activity
Monitoring
5.5
User Activity
Alerting
6.0
Dashboard
User Risk
Scoring
2006 20162014 - 2015
DETECTINVESTIGATE MITIGATEINTEGRATE ANALYZE
6.5
Alert Engine Overhaul
Security Awareness
ObserveIT History
6.7
Enhanced Alerts
Web Categorization
Anonymization
180 Rules to Protect Your Data
Built-in threat categories include:
• Application Data Theft
• Bypassing Security Controls
• Creating Backdoor
• Data Exfiltration
• Privilege Elevation
• Unauthorized Admin Tasks
• Malicious Software
• Shell Attack
• System Tampering
• Unauthorized Shell
Alert rules are automatically mapped to specific user
types (e.g., privileged, remote vendors, terminated
employees) with a different risk level for each specific
user group (these settings can also be user-
customized if desired).
Zero configuration time for most common insider risk issues
1
Auto-configuring rules to identify risk behaviors based on roles, applications, and systems
Full Web Monitoring
Know when users visit out-of-policy website categories for
increased visibility into online user behavior and detection of phishing/infections
Website categories are indicated
in alerts and reports for greater
visibility into user behavior.
See the story, not just HTTP/S requests, including encrypted traffic and dynamic content
No impact to business operations (versus blocking)
No expensive network appliances to manage
2
Detect Data Exfiltration through Print
Rule-based monitoring of print job sent to local or networked printers
What is being printed
Number of pages
sent to printer
Printer name
(local or network)
Large print operation
3
Guarantee Employee Privacy
Selective anonymization of user names, login accounts and computers for
enhanced user privacy and regulation compliance
Process to Expose individual users for
deeper inspection
Exclude specific groups from being
anonymized (e.g., remote vendors)
User Identity Anonymization for GDPR compliance
4
User meta-data integration
Easily create and manage complex list-
based rules
Import lists
While and black-list
5
Augment active directory roles with additional data and segmentation on users
Mac Agent Support
Full video and metadata recording on Mac desktops, laptops and servers
Brief Demo
5 Reasons to upgrade to v6.7
• Full website monitoring
• New Insider Threat Library
• Track Print Jobs
• Privacy with Anonymization
• Easily import user meta-data
Contact US
• Existing Customers – free upgrade (contact Sales or Support)
Sales@ObserveIT.com or Support@ObserveIT.com
• New Customers – Download trial at:
http://www.observeit.com/tryitnow
Thank You

More Related Content

PPTX
ObserveIT Version 6.7 Release Highlights
PPTX
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
PPTX
ObserveIT Remote Access Monitoring Software - Corporate Presentation
PPTX
Observe It Presentation
PPTX
Ins and outs of ObserveIT
PPTX
Data Protection Webinar
PPTX
Super User or Super Threat?
PPTX
Prevent Insider Threats with User Activity Monitoring
ObserveIT Version 6.7 Release Highlights
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
ObserveIT Remote Access Monitoring Software - Corporate Presentation
Observe It Presentation
Ins and outs of ObserveIT
Data Protection Webinar
Super User or Super Threat?
Prevent Insider Threats with User Activity Monitoring

What's hot (20)

PPTX
Zero Trust Model
PPTX
Zero Trust Networks
DOC
Stayer cis 349 final exam guide set 1 new
PDF
ImtechSaasIDbroch7
PDF
Understanding the Experian independent third party assessment (EI3PA ) requir...
DOC
Stayer cis 349 final exam guide set 1 new
PPTX
BalaBit 2015: Control Your IT Staff
PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PDF
Emma Aubert | Information Protection
PPTX
ObserveIT Webinar: Privileged Identity Management
PPTX
Cybersecurity - Keeping Your Business Protected
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PPTX
An Overview of IT Risk and Control
PDF
Vizru GDPR compliance framework
PDF
Supplier security assessment questionnaire
PDF
Application Security - Your Success Depends on it
PDF
Intrusion Detection System
PPTX
Nac market
PPTX
CASBs and Office 365 (with Argyle)
PDF
User_Access_IIA-LA_3-9-2016
Zero Trust Model
Zero Trust Networks
Stayer cis 349 final exam guide set 1 new
ImtechSaasIDbroch7
Understanding the Experian independent third party assessment (EI3PA ) requir...
Stayer cis 349 final exam guide set 1 new
BalaBit 2015: Control Your IT Staff
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
Emma Aubert | Information Protection
ObserveIT Webinar: Privileged Identity Management
Cybersecurity - Keeping Your Business Protected
Arbel Zinger | Microsoft Advanced Threat Analytics
An Overview of IT Risk and Control
Vizru GDPR compliance framework
Supplier security assessment questionnaire
Application Security - Your Success Depends on it
Intrusion Detection System
Nac market
CASBs and Office 365 (with Argyle)
User_Access_IIA-LA_3-9-2016
Ad

Viewers also liked (12)

PPTX
Insider Threat Law: Balancing Privacy and Protection
PDF
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
PDF
ObserveIT Brochure - Like a Security Camera on your Servers
PPTX
How to Implement an Insider Threat Program
PPTX
ObserveIT Customer presentation
PDF
Database Security, Better Audits, Lower Costs
PDF
Whitepaper: User Audit Options for Linux and Solaris
PPTX
DDos Attacks and Web Threats: How to Protect Your Site & Information
PPTX
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
PPTX
CyberArk
PDF
Managing privileged account security
PPTX
A Deep Dive into SharePoint 2016 architecture and deployment
Insider Threat Law: Balancing Privacy and Protection
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
ObserveIT Brochure - Like a Security Camera on your Servers
How to Implement an Insider Threat Program
ObserveIT Customer presentation
Database Security, Better Audits, Lower Costs
Whitepaper: User Audit Options for Linux and Solaris
DDos Attacks and Web Threats: How to Protect Your Site & Information
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
CyberArk
Managing privileged account security
A Deep Dive into SharePoint 2016 architecture and deployment
Ad

Similar to Observe it v67 webinar v5 (20)

PPTX
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
Unintentional Insider Threat featuring Dr. Eric Cole
PDF
10 Tips to Strengthen Your Insider Threat Program
PPTX
Insider Threats: Out of Sight, Out of Mind?
PPTX
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
PPTX
Hackers, Cyber Crime and Espionage
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Forcepoint - Analýza chování uživatelů
PDF
Identify and Stop Insider Threats
PPTX
Insider Threat
PPT
The Insider Threat
PPTX
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
PPTX
Network Monitoring Software Ensuring Secure and Reliable IT Operations.pptx
PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
PPTX
Extending CyberSecurity Beyond The Office Perimeter
PDF
What’s the State of Your Endpoint Security?
PPTX
Why information security is becoming the most important for mid size business...
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
10 Tips to Strengthen Your Insider Threat Program
Insider Threats: Out of Sight, Out of Mind?
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Hackers, Cyber Crime and Espionage
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Forcepoint - Analýza chování uživatelů
Identify and Stop Insider Threats
Insider Threat
The Insider Threat
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Network Monitoring Software Ensuring Secure and Reliable IT Operations.pptx
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Extending CyberSecurity Beyond The Office Perimeter
What’s the State of Your Endpoint Security?
Why information security is becoming the most important for mid size business...
Combating Insider Threats – Protecting Your Agency from the Inside Out

More from ObserveIT (15)

PPTX
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
PPTX
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
PPTX
Cloud Security Allianz Webinar
PPTX
Insider Threat Summit - The Future of Insider Threat Detection
PPTX
Why Insider Threat is a C-Level Priority
PDF
How to Build an Insider Threat Program in 30 Minutes
PDF
Xerox: Improving Data & App Security
PPTX
2014: The Year of the Data Breach
PPTX
3 steps to 4x the risk coverage of CA ControlMinder
PDF
3 Tips for Managing Risky User Activity in 2015
PDF
Case Study - Auditing remote access of employees at a leading financial insti...
PDF
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
PDF
Case Study - Establishing Visibility into Remote Vendor Access at Pelephone
PDF
PCI and Remote Vendors
PDF
Remote Access Outgoing VDI Gateway
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
Cloud Security Allianz Webinar
Insider Threat Summit - The Future of Insider Threat Detection
Why Insider Threat is a C-Level Priority
How to Build an Insider Threat Program in 30 Minutes
Xerox: Improving Data & App Security
2014: The Year of the Data Breach
3 steps to 4x the risk coverage of CA ControlMinder
3 Tips for Managing Risky User Activity in 2015
Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
Case Study - Establishing Visibility into Remote Vendor Access at Pelephone
PCI and Remote Vendors
Remote Access Outgoing VDI Gateway

Recently uploaded (20)

PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
L1 - Introduction to python Backend.pptx
PDF
medical staffing services at VALiNTRY
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
System and Network Administraation Chapter 3
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Understanding Forklifts - TECH EHS Solution
PDF
top salesforce developer skills in 2025.pdf
PPTX
ai tools demonstartion for schools and inter college
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Odoo POS Development Services by CandidRoot Solutions
L1 - Introduction to python Backend.pptx
medical staffing services at VALiNTRY
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Operating system designcfffgfgggggggvggggggggg
Odoo Companies in India – Driving Business Transformation.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms II-SECS-1021-03
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Wondershare Filmora 15 Crack With Activation Key [2025
System and Network Administraation Chapter 3
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
How to Migrate SBCGlobal Email to Yahoo Easily
Understanding Forklifts - TECH EHS Solution
top salesforce developer skills in 2025.pdf
ai tools demonstartion for schools and inter college
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...

Observe it v67 webinar v5

  • 1. Over 1,400 Customers Worldwide ObserveIT is the Global Leader in Identifying & Eliminating Insider Threats 2016 Innovation Award ObserveIT 6.7 Release Highlights November 2016
  • 2. Speakers Kevin Donovan Solutions Architect ITPM Michael Gordover Solutions Architect (ISC)² Associate CISSP, ITPM John Vigeant VP Sales, Americas
  • 3. Insider Threat is a Big Problem 3 90% of security incidents are caused by people 58% of breaches are caused from internal incidents or with a business partner’s organization 55% of attacks are originated by an insider Source: Verizon 2015 Data Breach Investigations Report Forrester’s Global Business Teechnographics Security Survey 2015 2015 IBM Cyber Security Intelligence Index
  • 4. The Challenge: Visibility & Privacy 4 Data exfiltration (USB, printing, web) Granting / elevating access privileges Unauthorized software access, downloads Questionable web activities (dark web, gambling) … and all must meet regulatory compliance standards
  • 5. Before 5.0 User Activity Monitoring 5.5 User Activity Alerting 6.0 Dashboard User Risk Scoring 2006 20162014 - 2015 DETECTINVESTIGATE MITIGATEINTEGRATE ANALYZE 6.5 Alert Engine Overhaul Security Awareness ObserveIT History 6.7 Enhanced Alerts Web Categorization Anonymization
  • 6. 180 Rules to Protect Your Data Built-in threat categories include: • Application Data Theft • Bypassing Security Controls • Creating Backdoor • Data Exfiltration • Privilege Elevation • Unauthorized Admin Tasks • Malicious Software • Shell Attack • System Tampering • Unauthorized Shell Alert rules are automatically mapped to specific user types (e.g., privileged, remote vendors, terminated employees) with a different risk level for each specific user group (these settings can also be user- customized if desired). Zero configuration time for most common insider risk issues 1 Auto-configuring rules to identify risk behaviors based on roles, applications, and systems
  • 7. Full Web Monitoring Know when users visit out-of-policy website categories for increased visibility into online user behavior and detection of phishing/infections Website categories are indicated in alerts and reports for greater visibility into user behavior. See the story, not just HTTP/S requests, including encrypted traffic and dynamic content No impact to business operations (versus blocking) No expensive network appliances to manage 2
  • 8. Detect Data Exfiltration through Print Rule-based monitoring of print job sent to local or networked printers What is being printed Number of pages sent to printer Printer name (local or network) Large print operation 3
  • 9. Guarantee Employee Privacy Selective anonymization of user names, login accounts and computers for enhanced user privacy and regulation compliance Process to Expose individual users for deeper inspection Exclude specific groups from being anonymized (e.g., remote vendors) User Identity Anonymization for GDPR compliance 4
  • 10. User meta-data integration Easily create and manage complex list- based rules Import lists While and black-list 5 Augment active directory roles with additional data and segmentation on users
  • 11. Mac Agent Support Full video and metadata recording on Mac desktops, laptops and servers
  • 13. 5 Reasons to upgrade to v6.7 • Full website monitoring • New Insider Threat Library • Track Print Jobs • Privacy with Anonymization • Easily import user meta-data
  • 14. Contact US • Existing Customers – free upgrade (contact Sales or Support) Sales@ObserveIT.com or Support@ObserveIT.com • New Customers – Download trial at: http://www.observeit.com/tryitnow