Skip links

Jim Routh on what makes Reveal Security unique

Jim Routh: “The primary objective is to identify a malicious user.”

Transcript

00:00

the goal primary objective is to identify a malicious user someone who has malicious intent and in fact that’s important when that user has access to critical Privileges and data however a more common use case in almost every private Enterprise is the privileged user

00:32

providing an identity that’s used by criminals or people with Criminal Intent that’s more common and the only way to discern the difference in those two use cases is through behavioral analytics and behavioral analytics applied to the activity the key component with reveal security is their use of

00:59

activity and comparing that activity to new user activity and doing the comparison of the two that’s the fundamental key to what makes reveal security unique

More Videos

LifeLabs & Reveal Security

“I feel a lot more comfortable being able to sleep well knowing that our environments are protected… Reveal gives us an extremely accurate representation of how users and identities are interacting with our data and our applications systems”

Read More »
See Reveal Security in action
Schedule a 30-minute live demo with our experts
Discover how you can quickly detect identity-based attacks across applications and cloud.
“Reveal Security’s Identity Journey Analytics approach can significantly improve identity threat situations by comparing users to like users, making it more effective and scalable than traditional UEBA.”
Jim Routh
Former CISO, MassMutual, Aetna/CVS
Get access to our exclusive guide to defending against Account Takeover attacks in applications and cloud.
It’s packed with actionable insights to strengthen your defences right now.