INSIDER THREAT PROTECTION:

Protect against and
recover from accidental
or malicious actions.

Check mark

Customer-defined, policy-based access controls

Check mark

Real-time data access monitoring

Check mark

Manage privileged users and 3rd parties

Some of the largest and most notable data breaches have resulted from insider actions, both accidental and malicious, via vulnerabilities such as lack of security training, broadly defined or excessive access permissions, and privileged user escalations.

DataKeep protection is built upon customer-defined policies that manage who, what, when, where and how users access decrypted data. Policies use role-based access (RBAC), privileged access management (PAM) and default to least privileged access (LPA) so only those needing data access are allowed. DataKeep logs all user data access requests, whether approved or denied, in real time to allow for prompt remediation. Event logs can be forwarded to Systems Information and Event Management (SIEM) for analysis and reporting.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Copyright © 2018 Security First Corp.     Terms of Use     Privacy Policy     Support Desk    Contact Us

Pin It on Pinterest