Skip links

Poste Italiane & Reveal Security

Nicola Sotira, Head of Poste Italiane’s CERT, describes monitoring MS365 with TrackerIQ to detect breaches:

“We saw something that with the standard tools we weren’t able to see, and in this case it was something that permitted us to be more proactive. We saw the anomaly starting before creating damage, so we were able to block the anomaly and nothing happened.”

Transcript

00:00

uh from the maybe credential point of view the guy that he tried to attack you and your employee are the same but they are different in the user stuff so this in this way you don’t know what you’re looking for for sure you have to detect anomalies immediately we start to

00:18

monitor 365 environment uh the cloud because of course the use of the cloud the access to the cloud is uh there is today under the radar and we need to put this environment under control try to detect anomaly in the assets and normally in the usage and we detect some

00:40

anomaly uh I cannot and say talk about the things that you see but you know the issue was related to access mailbox access all this kind of stuff and so some we saw something that with the standard tool we weren’t able to see and in this case was something that the need

01:01

us to be more proactive so we see they’re normally starting before creating the image so we were able to block them normally and nothing happened you know this is the value for us

More Videos

LifeLabs & Reveal Security

“I feel a lot more comfortable being able to sleep well knowing that our environments are protected… Reveal gives us an extremely accurate representation of how users and identities are interacting with our data and our applications systems”

Read More »
See Reveal Security in action
Schedule a 30-minute live demo with our experts
Discover how you can quickly detect identity-based attacks across applications and cloud.
“Reveal Security’s Identity Journey Analytics approach can significantly improve identity threat situations by comparing users to like users, making it more effective and scalable than traditional UEBA.”
Jim Routh
Former CISO, MassMutual, Aetna/CVS
Get access to our exclusive guide to defending against Account Takeover attacks in applications and cloud.
It’s packed with actionable insights to strengthen your defences right now.