Call a Specialist Today! 833-335-0427

Forcepoint SureView Insider Threat
The Visibility and Context You Need to Eliminate Insider Threats


Sorry, this product is no longer available, please contact us for a replacement.


Click here to jump to more pricing!

Overview:

Environment Options

Appliance
Appliance

Empower your organization to better protect the information entrusted to it by customers, citizens or other stakeholders by detecting your riskiest users and tracking the insider activities that could damage your organization.

“Trust, but verify.” You want to give your employees the latitude they need to do their jobs, but you also need visibility into their actions so you can protect your organization and the information entrusted to it by customers, citizens or others. Insider threats are often a greater risk than external attacks, and today many external attacks also turn into insider threats either by tricking the user or by silently subverting their browser or computer.

Most organizations know they need to take insider threats seriously, yet lack the resources or expertise to handle them effectively. Since 2001, the technology that powers SureView Insider Threat has made it possible for employers to stop insider threats through an objective, rigorous process of verification that captures all relevant data while respecting user privacy. Our technology connects the dots for you, capturing human behaviors arising from carelessness, lack of training or malicious intent that may be warning signs of an impending breach.

Historically, the term “insider threat” conjures up images of malicious employees creeping into dark offices, stealing company secrets in order to profit or create irreparable damage to the company. The truth is that this type of evil insider is rare, with instances of these types of threats occurring once in a decade or less. The real insider threat is the negligent employee A.K.A. the accidental threat. Negligent employees invite risk through uninformed, highly questionable behaviors. Via social media and email scams, adversaries target them, to con them into doing something that appears legitimate, but actually allows the adversary to slip “inside the gate” of the network. One-half of organizations view these staffers as their biggest threat.

Data Capture

SureView Insider Threat uses a lightweight endpoint agent to capture data without disrupting user productivity. The system monitors data’s location and movement, as well as the actions of users who access, alter and transport that data. This includes not only functions that directly affect the data, but telltale precursor actions that can signal a breach is coming. The system can even fingerprint your organization’s critical intellectual property and sensitive documents, enabling it to track the assets that you identify as most sensitive.

Collected user data can be viewed as a video replay that displays keys typed, mouse movements, documents opened or websites visited. This unique capability provides irrefutable and unambiguous attribution of end-user activity.

Behavioral Audit

Our deep experience protecting more than 1 million endpoints for government agencies and Fortune 100 companies means that we know what insider threats look like. That knowledge is embodied in SureView Insider Threat’s library of pre-defined policies, which allow you to stand up an effective insider threat prevention program right out of the box.

Our technology also baselines behavior to establish what is normal for each individual and for the organization as a whole. It then identifies deviations from that behavior, automatically placing risky users in a high-watch group for closer scrutiny. The system collates relevant information from across your enterprise and displays it in an intuitive, visual dashboard so that it can easily be reviewed and understood by even non-technical security personnel.

Focused Investigation

If a clear violation is detected, you can target specific events or users for investigation. SureView Insider Threat provides all the details, insight and complete context needed so your team can immediately assess the severity of the threat, remediate the problem and create new policies to prevent it from happening again.

SureView Insider Threat provides visibility into the many areas that network devices can't, including:

  • Deliberate, malicious acts such as intellectual property (IP) theft, fraud or sabotage that easily circumvent most data leak solutions
  • Mobile and internal users who take themselves offline or use encryption to avoid detection
  • Suspicious user activity within complex applications, including email programs and custom deployments of Enterprise Risk Management (ERM) and other solutions
  • “Leading indicator” actions, such as a screen capture that has been encrypted and saved to a USB drive

Unintentional Insiders: The Real Insider Threat

A lack of awareness accounts for much of the negligent employee’s behaviors, as 45 percent of workers receive no cybersecurity training on the job, according to CompTIA1 . Nearly two-thirds depend upon business-intended devices for personal activities like shopping, banking and social media surfing. Virtually all of them connect their devices to public Wi-Fi networks, with seven out of ten calling up company-related data while doing so. And when USB storage drives are involved, the results can be frightening.

The Unintentional Insider Threat

  • Three-of-five employees rely upon potentially insecure USB storage drives to transfer files among devices.
  • Thirty-five percent have borrowed someone else’s USB stick to transfer files.
  • More than one-fifth would pick up a stick they found in public.
  • An astonishing 84 percent of those who’d pick up a stick they found would plug it into one of their work devices.

Clearly, traditional security tools – while still playing a key role in safeguarding systems – no longer suffice as a sole remedy. Organizations need to match technology with human oversight, paving the way for 24/7/365 visibility into how users behave, no matter when or where they’re connecting to the network. Then, they have to prioritize each risk and launch remediation/mitigation measures.

See Threats Before They Become Disasters

SureView Insider Threat identifies risky behaviors by baselining “normal” for each user, the organization then captures deviations from “normal” such as: a change in data access, working hours, email activity etc. These deviations are risk indicators that serve as warning signs leading up to a breach. The riskiest users are pinpointed with deep visibility provided into their behaviors.

SureView Insider Threat’s integration and correlation with TRITON AP-DATA and multiple enterprise data sources provides enterprisewide visibility into how users handle data, to detect both unintentional insider threats and malicious activity, that would otherwise go unnoticed. Combining enterprise-wide data sources with behavior analytics does the investigating for you — providing insight into activity that, on its own, may seem benign, but in context could result in a costly breach.

SureView Insider Threat was designed as an insider threat solution starting in 2001. It is not, like some technologies, a solution retrofitted to the problem. The SureView Insider Threat team are domain experts who have spent their careers in information protection. Whether the incident is accidental or deliberate, or somewhere in-between, SureView Insider Threat gives you complete visibility and quickly identifies the riskiest users in your organization, all while preserving employee privacy guidelines.

Features and Benefits:

Benefits

  • Tracks endpoint user and system activity
  • Baselines “normal” activity across the organization
  • Exposes and quantifies risk through user behavior analytics
  • Enables investigation of anomalies with integrated, chronicled data sources
  • Provides incident replay, including full-event endpoint video recording
  • Detects policy violations hidden by encryption, whether in Web traffic, email or attachments
  • Reduces dependency on technical expertise for your investigators
  • Promotes education and remediation for accidental data leak prevention
  • Integrates seamlessly with DLP capabilities in Forcepoint TRITON products
  • Monitors offline activity for mobile and deliberately disconnected users
  • Scales easily using a highly-stable endpoint agent

Features

  • Trusted mission partner of government organizations and Fortune 100 companies since 2001
  • Behavioral analytics discovers top riskiest users, and provides deep visibility into those behaviors, including past behaviors
  • Video replay for full context to rapidly discern malicious from benign actions
  • Protects Personal Privacy through customizable, business-driven policies
  • Data collection from multiple sources, including TRITON AP-DATA
  • Protects against unintentional insider threats as well as malicious threats
  • Integrated, enterprisewide system rather than purchasing and maintaining a number of independent software applications
  • Unique fingerprinting solution
  • Proven, stable, lightweight Agent
  • Built as an Insider Threat solution from the ground up

Capabilities:

The Command Center:
The command center provides analysts their organization’s risk level at a glance: it displays the organization’s overall 30-day risk trend and a summary of the day’s riskiest users.

The Command Center - Organizations 30-Day Risk Trend

The Command Center - Organizations 30-Day Risk Trend

Video Replay:
Video replay provides complete, near-real-time context with an “over-the-shoulder” view of the end-user’s workstation. A security analyst can create a case and easily share data and replay with non-technical management or security personnel.

Identifying the Threat:
SureView Insider Threat comes with pre-configured policies identified by Forcepoint experts who have been implementing Insider Threat Programs for Fortune 100 and Government agencies since 2001. These policies are ready to protect your organization against the insider threat the day it is deployed.

Protecting Civil Liberties:
SureView Insider Threat policies are easily customized and created using The Policy Workbench or “policy wizard” and allows users to specify what information to collect and what information not to collect to preserve civil liberties and personal privacy.

Unique Fingerprinting Capabilities:
SureView Insider Threat features an extensive ability to fingerprint an organization’s critical intellectual property or sensitive document library. Most technologies simply hash these documents and compare the stored hash with files as they leave your network. This process is easily thwarted. A simple word change or even an extra period will significantly alter the hash value of the newly changed document. Therefore, typical detection methods require the entire document to be copied for detection while SureView Insider Threat can detect fractional movement from any part of a fingerprinted document. SureView Insider Threat is a point-ofuse discovery tool capable of capturing intentional and unintentional insider threats to an organization at the desktop/laptop level. This enables detection of abusive behaviors and capture of sensitive documents before encryption or deletion.

Light Footprint:
A distributed architecture reduces the processing load required to monitor an entire organization. Forcepoint SureView Insider Threat provides ongoing, automated visibility into accidental or malicious activity that otherwise goes unnoticed. It effectively consolidates and prioritizes security alerts sent from other systems and data sources, providing rich historical context and video replay. SureView Insider Threat acts as an “early warning system” to collect user data from all endpoints to pinpoint risky behavior. It records the activity for your review, giving you critical context and proof to stop threats before they become disasters.

 Key Problems SureView Insider Threat Solves

Documentation:

Download the Forcepoint SureView Insider Threat Datasheet (.PDF)

Price Note: