ObserveIT
Follow
2060 Followers
Follow ObserveIT on their other social channels!
About Us
Founded:
2007
Company Size:
51-200 employees
Company Type:
Private
Location:
Boston, MA. USA
Website:
ObserveIT is a user monitoring and investigation solution that identifies and eliminates insider threats. It continuously monitors user behavior and alerts IT and Security teams about activities that put their organizations at risk. ObserveIT provides comprehensive visibility into what all users are ...
Read more
Promoted Content
[ebook] Insider Threat Program: Your 90-Day Plan
Follow
949
ObserveIT 7.1 is here!
ObserveIT 7.1 takes a big step forward in helping customers detect and prevent data exfiltration.   Many organizations manage confidential or proprietary data in systems accessed via a web interface such as Microsoft SharePoint, Box for Business, Google Suite, and other storage systems. Sensitive data is accessed daily from web/cloud applications such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), trading systems, health applications, and other busi ...
Follow
1034
Mitigating the Dangers of Remote Login Accounts
by: Kevin Donovan When strengthening your insider threat security posture, it is crucial that third party access is not over looked. The term “insider” is defined as a current or former employee, contractor, or business partner who has or had authorized access to the organization’s network, systems, or data. An insider threat is when an insider intentionally or unintentionally misuses access to negatively affect the confidentiality, integrity, or availability of the organization’s cri ...
Follow
396
5 Security Technologies to Address Insider Threat
I’m sure we can all agree there’s a lot of noise in the cybersecurity marketplace surrounding technology. Which security solutions do what? When it comes to mitigating insider threats, which tools address the problem and what are the strengths and weaknesses of each?Forrester Senior Analyst, Joseph Blankenship, shared his perspective on the insider threat technology landscape in our webinar Cybersecurity Game Changers: A Look at Insider Threat Technologies. The webinar is chock-full of great ...
Follow
662
Inside the 2017 Threat Monitoring, Detection, and Response Report
The Crowd Research Partners 2017 Threat Monitoring Report was recently released and it is no surprise the majority of organizations think insider attacks have generally become more frequent over the last 12 months. What is a surprise is that only 30% of organizations feel moderately to extremely confident about their insider threat security posture. Granted it is challenging enough trying to keep the bad guy’s out, but protecting your organization from external threats ...
Follow
658
Does DLP Prevent Data Exfiltration…
Posted: August 8, 2017  - by: Michael GordoverIt happened again…Your trusted business partner was granted access to your internal file-share and began pulling gigabytes of data to their corporate issued laptop. You’re safe, right? All the discovery was done, the files are tagged, you know who has read and write permissions on the Share. Your network and endpoint DLP are patrolling the virtual corridors like watchdogs – if the data moves, you will know.Then why do C ...
Follow
807
Insider Threats Portrayed by Hollywood
Insider Threat is not only top mind for many organizations across the globe, it also seems to be on the minds of Hollywood writers and directors. This blog takes a look at the top 4 insider threats seen in popular TV shows and movies.Mr. RobotCategory of Insider Threat: IT Sabotage https://www.youtube.com/watch?v=Oc-AsN7d1wgThere are many scenes in Mr. Robot that exemplify just how dangerous malicious insiders can be to an organization. In one scene Elliot uses the access he has been granted by ...
Follow
809
EDR Compared to Insider Threat Monitoring and Analytics
What is EDR?EDR stands for Endpoint Detection & Response. These tools are security solutions designed to help security teams detect malicious activity on endpoints, understand the chain of attack, and enable administrators to respond appropriately. To truly understand the value of EDR you first have to understand how traditional anti-virus searches and identifies threats. Anti-Virus tools tag known viruses with a signature that uniquely identifies a specific virus. Then when scanning a syste ...
Follow
1694
Introducing ObserveIT 7.0
ObserveIT has released its next major version 7.0. The company’s mission has always been to identify & eliminate insider threat by focusing on what the user is doing vs what a system or a computer is doing. The 7.0 release reflects this ideology by enhancing its user interface, bolstering its detection capabilities, adding preventative controls, and providing insight with user analytics.New User InterfaceObserveIT 7.0 introduces a fresh feel and makes the already seamless UI even ...
Follow
945
Vault 7: WikiLeaks Reveals the Need for User Activity Monitoring & Analytics
WikiLeaks recently began a new series of leaks on the United States Central Intelligence Agency, codenamed Vault 7. It is the largest ever publication of confidential documents on the CIA—and, according to WikiLeaks, “eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.”   WikiLeaks tweeted the leak, and claims the information came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virgini ...
Follow
2861
6 Best Practices for Cyber Security in 2017
Every organization strives to have the best cyber security possible, but with the number of data breaches from insiders in the headlines today, keeping up-to-date with new security practices to implement is crucial. It can also be time-consuming. So, assuming you have the basics down: encrypting data, firewalls, etc., the best practices outlined below for 2017 are items you may not have previously considered, but definitely should. Check out the list of these best practices for cyber security as ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel