Opppppps! your message wasn’t sent!

Insider Threats are Growing

Insider Threats are Growing

 

ProLion stops insider threats in their tracks, by monitoring and logging user file access and identifying abnormal behaviour patterns.

 

Should these be detected, the user’s access is blocked, and no further damage can be done.

 

Reports are generated to prove compliance and audit access permissions.

Proactive Defense with Multiple Layers

Audit Access Permissions

 

Know who has access to what, and compare user permissions by role or department to remove overprivileged access

 

Full Audit Trail
Monitor all file accesses by user and generate reports on who accessed what and when.

 

Behavioural Pattern Analysis
Monitor user behaviour on file systems to detect day-one threats. Limits or eliminates user access if unusual behaviour is detected

Isolate the Attack

Isolate the Attack

 

ProLion can automatically block the Insider Threats attempting to access your data before a security or compliance event occurs.

 

An alert will be sent to IT, with a full audit trail of activity, explaining why ProLion viewed this as a threat.

Transparency and Governance

Transparency and Governance

 

Full data transparency at the user level – access activity, deletions, and changes are monitored. Traceability & Auditing of file access is provided.

 

Full compliance reporting for GDPR and other regulations.

Ability to integrate into your existing Security Information and Event Management (SIEM) platforms.

Additional Business Value

Additional Business Value

 

Ability to manage and report on storage usage and availability by departments and users. Service providers can use this to properly cross-charge storage costs to their customers.

 

Recovery of valuable storage space – saves cost and reduces backup and restore times by removing redundant or old data

Quick Time to Value

Quick Time to Value

 

Monitor your environment agentlessly and real time. Deploy on-premise or in the cloud within 24 hours.

 

Multi-tenant capabilities also built in for for Service Providers. Start real-time monitoring with instant blocking of insider threats.

Built for your central file servers

 

When a cluster is under duress, ProLion powers off the affected side to avoid a split–brain syndrome and then initiates a switchover to

the other side, ensuring Always-On availability, with complete security and permanent data consistency in the storage cluster.

 

Completely infrastructure-independent monitoring resulting in the most reliable decision-making. Lower TCO and higher availability.

“With CryptoSpike we have a ‘Last line of defense’. If, despite all other protection measures, there is a security breach due to a zero-day threat, for example, CryptoSpike recognizes it, stops it and we can easily undo it.”
Stan Braak
Senior Coordinator, Tilburg Municipality, Netherlands
With the recent Ransomware attacks in Healthcare we were very concerned that we had vulnerabilities within our infrastructure. With CryptoSpike we now have the confidence that we have protection for our NetApp Systems. The engagement with ProLion has been excellent and they have delivered a solution that was easy to deploy and easy to manage”
Head of Infrastructure
National Health Service, United Kingdom
Download Resources:

Are you worried that your organisation’s File Shares are infected with Ransomware? Click here for a Free Ransomware Threat Assessment

Get Demo
Contact Us
Please complete the form below and we will be in touch