Case Studies
Banking and Insurance
An employee gave credentials to a criminal group. The criminal group used these credentials to log into Office 365 from the same geo-location the employee was in, and used the employee’s permissions to read classified information.
An employee had been approached by one of the company’s competitors to extract Salesforce customer data for competitive advantage.
A group of attackers succeeded via social engineering to target several customers and obtain individual credentials. The attackers then logged into the application as legitimate customers and succeeded to perform money transfer transactions.
An employee made changes to a policy’s beneficiaries, and several days later started withdrawing money from the policy.
Featured Videos
CISO Talks Podcast
One of us had been socially engineered… We tried to investigate with the insurance company, but they said there’s nothing they can do if somebody, by mistake gives his credentials to an imposter.
The Needle in the Haystack
The invention of this new clustering algorithm, the ability to truly identify with a great signal-to-noise ratio that is truly lacking false positives, really promises to be revolutionary.
Behavioral vs. User Journey
You now have an opportunity to go back and rethink this insider threat space, but with a much higher likelihood of success, and much higher value being delivered with the higher fidelity of reporting.