Interset Brings Reputation Scoring to the World of Insider Threats

 
 
By Frank Ohlhorst  |  Posted 2016-01-03
 
 
 
 
 
 
 
 
 
  • Previous
    1 - Interset Brings Reputation Scoring to the World of Insider Threats
    Next

    Interset Brings Reputation Scoring to the World of Insider Threats

    The Interset Behavioral Analytics Engine ingests massive amounts of activity data and then uses AI to normalize the activity associated with the data.
  • Previous
    2 - Primary Dashboard Shows Detected Risks
    Next

    Primary Dashboard Shows Detected Risks

    The Interset main console (or primary Dashboard) offers a historical view of the level of risk detected by the system. It also summarizes that risk and provides a graphic representation of how risk could potentially affect security.
  • Previous
    3 - Defining Use Cases
    Next

    Defining Use Cases

    Use cases are critical policy definitions that can be constructed to identify certain behaviors and then take action on those behaviors. For example, if a user who never accesses an application from an unknown site attempts to launch that application, the use case script will be triggered to block the access.
  • Previous
    4 - Interset Platform Can Define Multiple Use Cases
    Next

    Interset Platform Can Define Multiple Use Cases

    The platform supports the creation of multiple use cases, allowing operators to create policies for most any event or transaction on the system. Use cases support Boolean logic and can be nested to achieve complex policy interactions.
  • Previous
    5 - Interset Couples AI, Analytics to Classify Activity
    Next

    Interset Couples AI, Analytics to Classify Activity

    Interset couples AI with analytics to create usage profiles that are translated into dominant behaviors that are used to classify what is normal or abnormal activity.
  • Previous
    6 - Integrated AI Identifies Risky User Behavior
    Next

    Integrated AI Identifies Risky User Behavior

    One of the key capabilities of the product is its ability to classify behavior and then determine when that behavior falls out of norms. The integrated AI is quickly able to assess if user behavior indicates a potential threat to the enterprise.
  • Previous
    7 - Interset Tracks Access of Sensitive Files
    Next

    Interset Tracks Access of Sensitive Files

    Risky behavior is only part of the security equation. Here, Interset also lists what sensitive files are accessed and the history around that access. The collected data can also be used to determine the level of risk and then compare that to the reputation score of the user accessing the files.
  • Previous
    8 - Interset Broadly Collects Data
    Next

    Interset Broadly Collects Data

    Interset's ability to expose potential threats is based the massive amount of data it collects and generates. An interactive dashboard tracks and tallies multiple data sets to produce a visual representation of system activity.
  • Previous
    9 - Data Tells the Story
    Next

    Data Tells the Story

    After it analyzes activity data, Interset builds what the company refers to as "stories" that illustrate the level of trust and the reputation of those accessing data and applications. Using that format, Interset is able to provide actionable information in an easily understood fashion.
  • Previous
    10 - Interset Provides Customizable Dashboards
    Next

    Interset Provides Customizable Dashboards

    Administrators can build custom dashboards to represent critical information using different graphs, triggers and so forth.
  • Previous
    11 - Single Dashboard Tracks Multiple Risks
    Next

    Single Dashboard Tracks Multiple Risks

    A single dashboard can track multiple risk factors, which also supports drilldown and provides antidotal information on the type of risk as well as where the most risk is occurring.
  • Previous
    12 - The Platform Delivers Extensive Risk Analysis
    Next

    The Platform Delivers Extensive Risk Analysis

    The platform can report risk over customizable time scales, giving a historical view of the level of risk, while providing the ability to drill down into additional stories to provide more insight into the analytics presented on the summary dashboard.
  • Previous
    13 - In-depth Logging Enables Deeper Data Analysis
    Next

    In-depth Logging Enables Deeper Data Analysis

    Extensive logging capabilities takes place behind the scenes to enable administrators to delve into the raw data to better understand how information is being processed by the platform as well as to support forensic tasks.
 

Security analytics company Interset wants to change the way IT pros think about security and bring the concept of reputation-based security scoring to a broader market, with the Interset Behavioral Analytics Engine. The offering can be best described as an extensible platform that incorporates machine learning that identifies security exceptions. In other words, the product ingests massive amounts of activity data and then uses AI to normalize the activity associated with the data. The technology, an extension of big data analytics, applies self-learning algorithms to build what can be referred to as "Access Stories," which are conceptualized reports that illustrate access behaviors and then place those behaviors in easy-to-understand contexts. Interset has demonstrated an uncanny ability to detect threats in real time, which gain additional meaning by being associated with context and reputation scores, enabling administrators to take action before those threats become serious data loss problems. Using access data as the glue to meld activity, users, applications and devices brings contextual security to the enterprise, while easing forensics and improving identity management.

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel