ProLion stops insider threats in their tracks, by monitoring and logging user file access and identifying abnormal behaviour patterns.
Should these be detected, the user’s access is blocked, and no further damage can be done.
Reports are generated to prove compliance and audit access permissions.
Audit Access Permissions
Know who has access to what, and compare user permissions by role or department to remove overprivileged access
Full Audit Trail
Monitor all file accesses by user and generate reports on who accessed what and when.
Behavioural Pattern Analysis
Monitor user behaviour on file systems to detect day-one threats. Limits or eliminates user access if unusual behaviour is detected
ProLion can automatically block the Insider Threats attempting to access your data before a security or compliance event occurs.
An alert will be sent to IT, with a full audit trail of activity, explaining why ProLion viewed this as a threat.
Full data transparency at the user level – access activity, deletions, and changes are monitored. Traceability & Auditing of file access is provided.
Full compliance reporting for GDPR and other regulations.
Ability to integrate into your existing Security Information and Event Management (SIEM) platforms.
Ability to manage and report on storage usage and availability by departments and users. Service providers can use this to properly cross-charge storage costs to their customers.
Recovery of valuable storage space – saves cost and reduces backup and restore times by removing redundant or old data
Monitor your environment agentlessly and real time. Deploy on-premise or in the cloud within 24 hours.
Multi-tenant capabilities also built in for for Service Providers. Start real-time monitoring with instant blocking of insider threats.
Are you worried that your organisation’s File Shares are infected with Ransomware? Click here for a Free Ransomware Threat Assessment