Connect with us

Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website. .

Top Stories

CYBERARK ADVANCES INSIDER THREAT DETECTION TO ACCELERATE INCIDENT RESPONSE

CYBERARK ADVANCES INSIDER THREAT DETECTION TO ACCELERATE INCIDENT RESPONSE

New CyberArk Capabilities Detect and Alert on High-Risk Privileged Activity During User Sessions to Help Security Teams Better Prioritise Threat Response

 CyberArk(NASDAQ: CYBR), the company that protects organisations from cyber attacks that have made their way inside the network perimeter, today announced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks.

With this release, CyberArk is delivering a new integration that provides deeper insights into privileged activity across an organisation. A new data feed from CyberArk Privileged Session Manager into CyberArk Privileged Threat Analytics, both part of the CyberArk Privileged Account Security Solution, enables security teams to receive customisable, prioritised alerts with granular detail on high-risk privileged activity, watch suspicious sessions in-progress, and terminate potentially malicious sessions to disrupt potential attacks – all from one platform. By helping to prioritise the review of privileged session logs, CyberArk can also improve efficiency and shorten IT audit cycles to reduce costs.

Analyse High-Risk Privileged Activity to Stop Insider Attacks

An insider who has gained access to privileged credentials can initiate seemingly legitimate privileged user sessions. Without the automated real-time detection and alerting on risky activities within privileged sessions, an inside attacker may operate undetected.

According to the SANS Institute, only nine percent ranked their insider threat prevention methods as ‘very effective.’1 Most organisations are overwhelmed by alerts, with 93 percent unable to triage all relevant threats.2

The CyberArk solution improves security teams’ ability to respond to external threats and malicious insiders with the flexibility to extend detection beyond initial account logon events. CyberArk allows security operations teams to assign risk levels that are most relevant to their organisation, monitor and analyse actual behaviour during a privileged session, identify activity or commands that may indicate compromise, and prioritise threat response based on alert severity.

Improve Productivity and Cost Savings for Audit and Compliance

Based on CyberArk’s experience working with customers, an average large corporation could have thousands of privileged user sessions running on its IT infrastructure each day. With enormous amounts of security data and privileged session recordings to sift through, it becomes nearly impossible for audit and compliance teams to identify risky or suspicious activity. Furthermore, to meet certain global audit and compliance regulations, dozens of full time auditors who are focused solely on this task are often required to manually review a certain percentage of all privileged session activity.

CyberArk delivers a new level of automation for compliance and audit teams. The CyberArk solution applies risk scores based on customer-defined policies to live and recorded sessions, empowering auditors to prioritise or deprioritise privileged activity for review. This enables them to work more efficiently, deliver greater value to the business, accelerate audit cycles to reduce total IT audit costs, and create a consistent approach for examining the risks associated with privileged activity.

“By delivering an integrated solution for threat detection based on privileged sessions, we help identify malicious activity hidden in a sea of legitimate data, and enable rapid threat response,” said Roy Adar, senior vice president, product management, CyberArk. “In addition, organisations could potentially save thousands of man hours that would have been spent manually reviewing sessions. These time and cost savings are especially important in context of requirements like those associated with the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) guidelines and similar global regulations.”

Supporting this announcement, cyber security experts from CyberArk Labs and customers’ security operations teams identified some examples of commands that are frequently associated with malicious – or accidentally damaging – behaviour. Highly sensitive commands that were frequently cited as being indicative of risk include “mmc.exe, Active Directory Users and Computers” on Windows systems, as well as commands containing the terms “authorized_keys” and “sudoers” on *nix systems.

To learn more, read the CyberArk blog: “Spot Insider Threats: 10 Commands Commonly Used During the Cyber Attack Cycle.”

Global Banking & Finance Review

 

Why waste money on news and opinions when you can access them for free?

Take advantage of our newsletter subscription and stay informed on the go!


By submitting this form, you are consenting to receive marketing emails from: Global Banking & Finance Review │ Banking │ Finance │ Technology. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Recent Post