Access Control, Identity and User Monitoring

An insider threat can happen when someone close to an organization with authorized access misuses that access to negatively impact the organization’s critical information or systems. This person does not necessarily need to be an employee – third party vendors, contractors, and partners could pose a threat as well.

producer

HID

HID - Authentication and access solutions from market leader

Authentication and access solutions from market leader

ObserveIT

ObserveIT - Insider Threat Management

 

 

 

 

 

 

 

 

 

 

ObserveIT empowers organizations to precisely identify and proactively protect against malicious and negligent behavior of everyday users, privileged users and remote vendors. ObserveIT reduces security incidents by changing user behavior through real-time education and deterrence coupled with full-screen video capture of security policy violations.

show detail
SecurEnvoy

SecurEnvoy - SecurAccess

Secure authentication using one-time passwords sent by SMS, email software tokens. Users no longer need to frustrate  administrator´s demand to remember difficult passwords. Users have one-time passwords on one! Through integration with your Microsoft Active Directory, Novell eDirectory, Sun Directory Server and OpenLDAP you ensure simply safe access for all your employees in a few moments.

 

 

show detail
Wallix

Wallix Bastion

Wallix Bastion

 

show detail

calendar Comguard

banner

VIRTUAL SECURITY ANALYST

By measuring the risk, it evaluates the relevant threats, prepares remedial measures, accelerates operational efficiency, and enables asset filtering.

click for more info

ThreatGuard 2.0 - NEW virtual security analyst

By measuring the risk, it evaluates the relevant threats, prepares remedial measures, accelerates operational efficiency, and enables asset filtering.