Ekran System Blog

News, opinions, and industry insights

August 14, 2019

User behavior monitoring is a new approach to insider threat prevention and detection. A lot of companies include a user and entity behavior analytics (UEBA) solution in their insider threat program. Implementing such a program is obligatory to comply with a lot of industry standards (e.g. NIST, HIPAA, PCI DSS, etc.). However, each company is free to use any insider threat prevention tool that meets their needs. 

 

In one of our previous articles, we analyzed what a UEBA solution is. Today, let’s talk about five levels of user behavior monitoring.

What...
Category:
August 01, 2019

Stopping insider threats isn’t easy. There are a number of behavioral indicators that can help you see where a potential threat is coming from, but this is only half the battle. Reliable insider threat detection also requires tools that allow you to gather full data on user activities. However, fully discounting behavioral indicators is also a mistake. They allow you to detect users that pose increased risks of being malicious insiders and better prepare you for a potential attack by turning your attention to them.

 

In this article, we cover four behavioral...

Category:
July 08, 2019

In enterprises, there are different ways you can manage access to your critical data. The two most common approaches are privileged access management (PAM) and privileged user management (PUM). But what is the difference between them?

 

In this article, we compare PUM vs PAM. In 2019, it’s still challenging to draw the line between these approaches. We also take a look at which of the two is best for ensuring your company’s cybersecurity.

 

The problem of uncontrolled privileges

 

The less control you have, the more money...

Category:
May 30, 2019

Protecting a company’s network against data leaks is the first priority of any security officer. However, this task is becoming more complex because of strong competition and the popularity of Bring Your Own Device policies. Though there are a wide variety of cybersecurity solutions on the market, choosing the wrong system may lead to security gaps.

 

Data leak prevention (DLP) systems are one of the oldest types of data protection software. But are they a time-tested solution or an outdated practice? Let’s find out the main pros and cons of data leak...

Category:
May 16, 2019

Establishing privileged account management procedures is an essential part of insider threat protection. This process is unique for each organization, depending on its size, industry, security practices, etc. Fifty-five percent of security officers believe privileged users represent the biggest insider threat to an organization according to the 2018 Insider Threat report prepared by Crowd Research Partners.

 

A well-tuned privileged access management (PAM) solution helps to mitigate this threat. In this article, we talk about the top five examples of poor...

Category:

Pages