You have been tasked with implementing security controls in your organization to find out who might be taking customer lists across the street to a competitor. You need a tool that will record all activity from any user that logs in to a computer. The software needs to report 24/7 because there are remote employees that have access to confidential records from any location.
Where do you start on a project like this, and how do you accomplish it?
The first thing you need to do is find the right tools to get the job done. There is a lot of employee monitoring software available to use, but they are not all the same. Especially when it comes to automation and having the ability to define what the criteria is for someone stealing confidential company data. That said, InterGuard, our insider threat detection software will record everything that is done on the computer (email communications, web site activity, files being moved, keystrokes being types, etc.) and then you can create Alert Words coupled with instant Notifications to find out exactly WHO is stealing data, WHAT kind of data they are taking, and WHEN the theft occurred. In fact using InterGuard is so easy that you can really find out in 7 easy steps if an employee is committing a data breach with Alert Word Notifications.
Using Alert Word Notifications
Alert words are words and phrases that you can create and customize to trigger an email notification. As an example: let’s say that you have a category called “Insider Threats” and in this category you add specific words that you associate with a data breach. You have added the words “customer list”, “contact database”, and “client information” to your “Insider Threats “category. You can create notifications (IMMEDIATE, daily, weekly, monthly, etc.) that will be sent to your email (or anyone you choose) that indicates an employee just triggered the alert and you will have full details of the event.
The ability to have an instant alert something was just stolen from you (we suggest sending the alerts to a team of people) will provide you with enough time to react accordingly and take appropriate actions with respect to the employee who committed the data theft.
Setting Up Alert Word Notifications (Try it Out Today!)
(Note: Because you are doing this on our test drive environment, you will not be able to get an actual notification email to you… If you would like to evaluate our product for 7 days, please call 888-550-3130.)
There you have it! Setting up an insider threat detection alert really can be done quickly and after it has been set up, it will also significantly reduce the amount of time that it takes do detect when an employee is stealing valuable data from work.
About Awareness Technologies
Awareness Technologies develops award winning monitoring software that records and controls all end user activity on all PC, Mac, iPhone, iPad, iPod, Android phones and tablets, and blackberry mobile devices.
As the pioneer for Unified Insider Threat Prevention, Awareness Technologies’ SaaS-based service is easily available and affordable for businesses of any size – especially the SMB market. Architected at the endpoint, clients can access 4 technologies including DLP (Data Loss Prevention), Web Filtering, Employee Monitoring and Laptop Recovery, through one agent download and one control console.
Awareness Technologies has over 10,000 businesses world-wide currently depending on its solutions to protect their data from insider threats, and has been named on the Deloitte Technology Fast 500, Inc. 5000 and Software 500. In addition to running seamlessly in a local OS environment, Awareness Technologies’ products are also Citrix and vmware ready.
Our solutions allow businesses insight and provide details regarding employee activities on and off the network to make certain they are staying in alignment with the guidelines of company policies and procedures in a comprehensive, yet easy to manage cloud based environment.