Insider Threats are Growing
ProLion stops insider threats in their tracks, by monitoring and logging user file access and identifying abnormal behaviour patterns.
Should these be detected, the user’s access is blocked, and no further damage can be done.
Reports are generated to prove compliance and audit access permissions.
Audit Access Permissions
Know who has access to what, and compare user permissions by role or department to remove overprivileged access
Full Audit Trail
Monitor all file accesses by user and generate reports on who accessed what and when.
Behavioural Pattern Analysis
Monitor user behaviour on file systems to detect day-one threats. Limits or eliminates user access if unusual behaviour is detected
Isolate the Attack
ProLion can automatically block the Insider Threats attempting to access your data before a security or compliance event occurs.
An alert will be sent to IT, with a full audit trail of activity, explaining why ProLion viewed this as a threat.
Transparency and Governance
Full data transparency at the user level – access activity, deletions, and changes are monitored. Traceability & Auditing of file access is provided.
Full compliance reporting for GDPR and other regulations.
Ability to integrate into your existing Security Information and Event Management (SIEM) platforms.
Additional Business Value
Ability to manage and report on storage usage and availability by departments and users. Service providers can use this to properly cross-charge storage costs to their customers.
Recovery of valuable storage space – saves cost and reduces backup and restore times by removing redundant or old data
Quick Time to Value
Monitor your environment agentlessly and real time. Deploy on-premise or in the cloud within 24 hours.
Multi-tenant capabilities also built in for for Service Providers. Start real-time monitoring with instant blocking of insider threats.
Built for your central file servers
When a cluster is under duress, ProLion powers off the affected side to avoid a split–brain syndrome and then initiates a switchover to
the other side, ensuring Always-On availability, with complete security and permanent data consistency in the storage cluster.
Completely infrastructure-independent monitoring resulting in the most reliable decision-making. Lower TCO and higher availability.
Are you worried that your organisation’s File Shares are infected with Ransomware? Click here for a Free Ransomware Threat Assessment