Deployments
In one adopting organisation, an insider threat was detected through isolating a series of uncharacteristic behaviours.
An admin user logged into a critical server using a functional account which raised the alarm. Then using IP attribution to identify the true identity of the inside threat, the company was able to cancel the individual’s contract and instigate legal proceedings against the offender.
The replacement of multiple insecure file transfer methods by an international Global Bank was necessary for them to get control and visibility over end-to-end transactions.
A Managed File Transfer solution we deployed with full auditing capabilities meant we could give the client full control and visibility of their data. Meanwhile our comprehensive training package enabled our client to get the most from their new solution.
A leading financial services company identified data exfiltration. Standard forensic tools were stumped. Each endpoint connected to a different IP address and a unique domain name.
Cybereason’s Hunting Engine checked tactics, techniques and procedures to reveal 3,000 compromised end-points, each with daily-changing indicators of compromise.
|