insider risk deterrence and detection - aaae · gartner security and risk management summit 2016....

16
Company Overview November 3, 2016 Insider Risk Deterrence and Detection

Upload: trancong

Post on 27-Apr-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

Company Overview November 3, 2016

Insider Risk Deterrence and Detection

© Copyright Confidential2

• Cloud-based post-hire background screening & continuous monitoring software• Patented, proprietary, proven software system with high availability and scalability

IDentrix is a leading provider of analytics for detecting and deterring insider threat risk.

Who is IDentrix

IDentrix History of Success

15-Year Track Record helping government combatterrorism, fraud and insider threats

Originally developed to help the FBI screen flight school applicants after 9/11

3

Our Solution

4

Comprehensive Public Data Sources

IDentrix continuously scans 1,500federal, state and county public data sources

• Wants and Warrants• Bookings and Arrests• Criminal History• Sex Offenders

Criminal• Bankruptcy• Liens and Judgments• Lawsuits• Foreclosures

Civil• Professional Licenses• Driver’s Licenses• Healthcare Licenses• Concealed Weapons

Licenses• Healthcare• OFAC • Terrorist Watchlists• Criminal Watchlists

Sanctions

© Copyright Confidential5

Start with External Pressure

© Copyright Confidential6

“About 80% of these insiders can be caught using rules and monitoring employees’ behaviors and the pressures they face in their personal lives.”

Gartner Security and Risk Management Summit 2016

Cognition/Evaluation – How it Works

Evaluate Impact

Negative Impacts

Positive Impacts

• Indication of fraud• Criminal History• Negative Financial History• Loss of License• Etc.

• Verified identity• Verified background• Lack of Criminal History• Positive Financial History• Etc.

Identity Events• Fraud• Relationships• Background

• Criminal• Financial• Etc.

• Social Media• Licenses• Assets• Business Affiliation• IT Security• Human Resources

Identity Scoring

Identity Alerts

• Alert Type Categorization• Thresholds Analysis• Automated Notifications

• Numerical Scoring• Positive/Negative Factors• Score Trend Analysis

Inform CustomerDetect & Validate

Identity Events

7

Weak vs. Strong Insider Threat Signals

© Copyright Confidential8

Low Effort

High EffortLow knowledge = weak human signals

High knowledge

IT Behavioral Pattern Recognition

Access Management

HR Appraisals and Reviews

Employee External Monitoring

Combined Data

How we are Different

© Copyright Confidential9

1. Continuous Monitoring – automates the analysis of multiple sources of information to perpetually evaluate changes in personal background and behavior risks.

2. Identity Visualization – creates situational awareness through a 360 degree view of individuals and risks through advanced data visualization.

3. Risk Alerts – provides automated notifications of potential identity-based risks due to changes in a person’s background or behavior.

4. Legally-defensible Audit Trail – digitally links identity, process and decision data, to ensure efficient and cost-effective compliance with security and privacy regulations.

Our Customers

10

Easy, Transparent, Accurate

1. Selected through a multiple vendor review process2. Fast, easy implementation of less than a week3. No technology involvement required to start4. Provided the most comprehensive source of real-time alerts5. Alerting process was easy for the client to act6. Competing alerts were obscured in other parts of competitor’s

offering7. IDentrix optimized customer’s alerts to match against role, location

and severity of the incident8. The reason for an alert was transparent and easily traceable to the

original record9. 100% accuracy in data capture and assignment of alerts to the right

employee

© Copyright Confidential

“Number of data sources and speed

was huge.”

11

-Global Aviation Security Officer

Customer Neptune Results

• Enrolled 30,000 identities• Monitored thousands of sources• Detected over 800 incidents• Independently investigated and

verified arrest alerts• Disqualified 24 employees

© Copyright Confidential

“With IDentrix, we can save 40 percent of traditional screening costs.”

12

Customer Neptune Alerts

Bookings/Arrests• Criminal Possession• Intent to sell marijuana• Drug related, intent to sell

Criminal Charges• First degree assault• Second degree robbery• Receiving stolen property• Criminal possession• Stolen property; weapon• Felony possession• Controlled substance• Injury/risk of injury to minor• Endangered welfare of a child• Photo sexual act

© Copyright Confidential

Sanctions• Prohibition from working on

Government Contracts

Sex Offenders• Multiple sex offenses

Death Records• 9 Recorded Deaths

13

• Enrolled 60,000 identities• Monitored thousands of sources• Detected over 1,771 incidents• Evaluated risk for follow-up

action

Customer Falcon Results

© Copyright Confidential

“IDentrix alerts us of criminal conduct so we can get out in front and respond as needed.”

14

Customer Falcon Alerts

Bookings/Arrests• Felony Theft• Burglary• Drug Possession• Intent to distribute• False imprisonment• Second degree assault• Criminal damage to property• Receiving stolen property• Assault and battery• Cruelty to children• Strangulation

Criminal Charges• Criminal felony• Rape• Assault• Theft• Burglary• Property Crimes• Drug Violation• DUI• Felony narcotics possession• False impersonation, forgery

© Copyright Confidential

Death Records• 14 Recorded Deaths

15

Schedule a demonstrationAdd external behaviorto your insider threat management program

Contact IDentrix:[email protected]

16