Behavioral firewall helps guard against data breaches
When a data breach is just as likely to originate from inside the organization as outside, protecting an enterprise can be a difficult task.
Californian company Preempt is launching a new proactive approach that allows organizations to spot threats in real-time without engaging already overwhelmed security teams.
Preempt Behavioral Firewall protects enterprises from security breaches and malicious insiders with an approach that couples User and Entity Behavior Analysis (UEBA) with Adaptive Response to provide the most effective solution for both detecting and responding to threats.
"According to Verizon's DBIR, in 60 percent of breaches, attackers are able to compromise an organization within minutes. This highlights a need for real time visibility into breach detection and response capabilities that can instantly preempt these threats," says Roman Blachman, CTO and co-founder of Preempt. "We built the Preempt Behavioral Firewall because traditional UEBA products can detect threats, but are unable to respond, and next generation firewalls are too deterministic to understand user behavior or obtain a fine grained response to potential breaches and insider threats. One solution is all alert, no action and the other is too blunt to be effective".
Preempt Behavioral Firewall reduces the impact of a breach by instantly verifying the identity of users through a set of adaptive responses dependant on the type of threat, type of user, and other key security indicators. This approach, along with greater visibility and insights helps customers reduce their attack surface.
Key features include User and Entity Behavior Analysis which offers greater visibility into an organization's risky users, endpoints, stale or compromised accounts, and privileged user behavior. Interactive analytics also assist in reducing the attack surface before an incident occurs.
Adaptive Response and Enforcement includes response mechanisms -- like block, notify, allow, re-authenticate or multi-factor authentication -- to take action and resolve suspicious activities when abnormal behavior is detected.
There's also a Policy Engine that arms security teams with flexible and customized preset rules, as well as personalized policies based on an organization's specific needs, allowing security controls to respond to complex multi-stage threats.
For more information and to sign up for a live demo of the software in action you can visit the Preempt website.
Photo Credit: Andrea Danti/Shutterstock