Monitor user behaviour and network activities to detect and mitigate insider threats quickly.
Detect and deter insider cybersecurity breaches
Identify abnormal network behaviours such as lateral movements, reconnaissance or suspicious data exfiltration in outbound traffic.
User monitoring and intelligent analytics
Monitor for signs of credential theft, privileged account breaches, hijacked accounts and login anomalies, malicious activities at the operating system, application and database levels.
Minimise dwell time
Automated threat-hunting algorithm reviews user and network activities to quickly identify anomalies before they become breaches.
Features and Specifications
Automated threat-hunting algorithm reviews both user and network activities to identify potential indicator of compromise (IOC) risks based on customer use cases, security outcomes, risks and priorities.
Lightweight sensor/agent runs on servers hosting critical assets, data and applications.
Monitor privileged operations that are security relevant for anomalies and unusual operations such as abuse of data access, unauthorised transactions and excess privileges.
Gathers insights into individual user personas to establish a pattern of normal behaviour in which to identify anomalies and provide fast detection.
24/7 monitoring via integration into the Lumen Security Operations Centre (SOC).