Ekran System Blog

News, opinions, and industry insights

August 19, 2019

Multi-factor authentication (MFA) is an essential part of today’s identity and access management best practices. It’s also one of the main compliance requirements for user identity verification. MFA allows you to add one more layer of protection to critical endpoints, data, and functionality. The main function of MFA is to make sure that the person or entity trying to access protected assets really is who they claim to be.

 

In this article, we explain what true multi-factor authentication is and take a look at the key two-factor authentication methods you...

Category:
August 14, 2019

User behavior monitoring is a new approach to insider threat prevention and detection. A lot of companies include a user and entity behavior analytics (UEBA) solution in their insider threat program. Implementing such a program is obligatory to comply with a lot of industry standards (e.g. NIST, HIPAA, PCI DSS, etc.). However, each company is free to use any insider threat prevention tool that meets their needs. 

 

In one of our previous articles, we analyzed what a UEBA solution is. Today, let’s talk about five levels of user behavior monitoring.

What...
Category:
August 08, 2019

Knowledge is power. Especially in the hands of your competitors.

 

Information about your company, its products and services, its finances, its sales, and its marketing strategy is a weapon of modern economic warfare. In this article, we explore the world of industrial espionage and talk about ways to prevent it. Keep calm and take the right measures so your company secrets stay secret.

 

What is industrial espionage?

 

Intelligence on competitors gathered in a legal way can give a leg up in the...

Category:
August 01, 2019

Stopping insider threats isn’t easy. There are a number of behavioral indicators that can help you see where a potential threat is coming from, but this is only half the battle. Reliable insider threat detection also requires tools that allow you to gather full data on user activities. However, fully discounting behavioral indicators is also a mistake. They allow you to detect users that pose increased risks of being malicious insiders and better prepare you for a potential attack by turning your attention to them.

 

In this article, we cover four behavioral...

Category:
July 08, 2019

In enterprises, there are different ways you can manage access to your critical data. The two most common approaches are privileged access management (PAM) and privileged user management (PUM). But what is the difference between them?

 

In this article, we compare PUM vs PAM. In 2019, it’s still challenging to draw the line between these approaches. We also take a look at which of the two is best for ensuring your company’s cybersecurity.

 

The problem of uncontrolled privileges

 

The less control you have, the more money...

Category:

Pages