Identity and Access Threat Prevention

Reduce risk and preempt threats based on identity, behaviour and risk

Approach

Continuous Identity Insights

Our Identity and Access Threat Prevention (IATP) solution provides actionable insights, allowing your security team to drive remediation strategies and enforce best practices for policy and control. The unique adaptive capabilities of the platform will enable you to automate responses with the right type of enforcement or notification based on identity, behaviour and risk. This ensures the right level of security is delivered to either stop a threat or allow valid users to get on with their work.

User and Entity Behaviour Analytics (UEBA) detects and prevents external and insider threats by learning the behaviour and developing a risk score for every user and device on the network. Our continuous health and risk assessment reveal password problems, privileged access, stale accounts, stealthy admins and Active Directory (AD) configuration issues, so that you quickly mitigate risk. Trusted and untrusted access is baselined through analysis of live authentication traffic combined with SSO, Cloud Directories, VPN and more to block and contain malicious threats such as credential compromise, account takeover and lateral movement but ensure legitimate transactions smoothly continue.

Adaptively Challenge and Respond

The solution is built on a policy engine that matches users, behaviours, risk and assets into a policy that meets any organisation’s needs. Based on these criteria, a wide range of responses can be invoked that can escalate based on the situation. This ensures that the action taken strikes the appropriate balance between security and enablement.

USER BEHAVIOUR ACTION BENEFIT
Priviledged User First time login to Network Server MFA Validate identity
Employee Remote access to executive laptop Block Stop malicious insider
Service Account Interactive login Isolate Prevent credential compromise
HR Employee HR server login Re-authenticate Business continuity
Third-party Vendor Access supply chain database Request approval Prevent unauthorised access

An Expert Guide on Identity & Access Threat Prevention

Understand the importance of identity, access and

real-time threat prevention and discover why they should

be brought together in our comprehensive white paper.

Download Now

Business

Benefits and Features

Business benefits are abundant when it comes to our Identity and Access Threat Prevention solution.

"

Continuously Reduce Risk

Insights and analytics reveal compromised users, password problems, privileged access, stealthy admins, AD configuration issues and more.

Increase SOC Efficiency

With preemptive blocking and automated real-time resolution of security threats and incidents.

Unified Visibility

Of all users, privilege, behavioural access patterns and accounts on-premise, in the cloud or hybrid environments; across all authentication and access platforms.

Ease of Deployment

Simple, centralised deployment provides fast values and
enforcement without an agent on the protected devices. 

Business

Use Cases

IATP solutions can play a central role in a variety of security use cases due to their inherent flexibility and many options for user engagement and enforcement. This can include threat prevention, risk management, privileged account management, incident response, and enforcing a wide range of enterprise access and security policies.

Monitor and Protect Privileged Accounts

  • Privileged Account Discovery
  • Manage Risk
  • Monitor Business Privileges
  • Privileged Identity Use

Improve Incident Response and Forensics Efficiency

  • Reduction of Alerts
  • Event Triage and Prioritisation
  • Track Risk by Business Unit
  • Hunt Threats

Eliminate Breaches and Compromised Credentials

  • Compromised Accounts and Devices
  • Lateral Movement
  • Infrastructure Attacks
  • 3rd Party Users

Proactively Reduce Risk and Support Compliance

  • Stale Assets
  • Weak or Exposed Passwords
  • Account Sharing
  • Audit and Compliance

Add Identity-Based Access Controls to Any App or Resource

  • Workstation Logins
  • Protect High-Value Servers and Applications
  • Adapt Policy Based on Risk

Prevent Insider Threats

  • Insider Access Abuse/Malicious Insiders
  • Abuse of Privileges
  • Risky or Careless Behaviour

Want to Learn More?

Sign-Up For a Demo