ROCKVILLE, Md.--(BUSINESS WIRE)--Enterprise endpoint security provider Triumfant, today announced the addition of an insider threat module to AtomicEye, the most intelligent, precise, advanced threat detection and remediation technology on the market today. The newly enhanced features utilize AtomicEye’s unique analytics capabilities that thoroughly detect and quickly respond to sophisticated attacks on the endpoint in order to identify anomalous user behavior and detect misuse. Designed for organizations that recognize the inevitability of a breach, AtomicEye distinctively combines the largest data collection of any product with the context of server-based analytics to provide exceedingly accurate levels of anomaly discovery. Triumfant will be demonstrating AtomicEye at this week’s Gartner Security & Risk Management Summit, being held in Maryland’s National Harbor June 13-16. Triumfant can be found at booth 445.
Insider threats continue to grow at an alarming rate and are increasingly difficult to discover. According to Verizon’s 2016 Data Breach Investigations Report, 70% of insider actions take months or longer to discover1. Whether malicious or accidental, insider threats create a significant impact on an organization’s ability to protect sensitive data. By bringing to bear AtomicEye’s patented analytics for detecting, analyzing, remediating and preventing malicious attacks while using it to collect data on user behaviors, Triumfant is able to provide real-time detection and remediation of malicious insider threats before they can cause damage. The new insider threat module provides a comprehensive security solution that extends beyond simple endpoint security and addresses user behavior to give enterprises the ultimate visibility into what is occurring on their networks at any given time.
“Effective security comes down to knowledge and visibility, and insider threat detection is no different,” stated John Prisco, CEO of Triumfant. “With the proven analytics of AtomicEye and its success in detecting anomalies on the endpoint, the next logical step was to extend its capabilities to address specific user behaviors. Only by knowing how users typically behave can you accurately determine if they are deviating from the norm. AtomicEye now gives organizations the peace of mind that whether a breach is occurring outside the perimeter or at the hands of a trusted insider, it will be detected in time to remediate and mitigate any major loss.”
AtomicEye combines efficient anomaly discovery with analytics that provide the context necessary to identify malicious activity, determine the threat and impact of that activity, and automate the construction of situational, contextual and precise remediation that repairs the attack and all associated damage to the machine within minutes and without disrupting the business. AtomicEye’s continuous monitoring now extends from the endpoint to the user and can detect with certainty, in real-time, anomalous user behavior. As soon as suspicious behavior occurs, a remediation plan is set in motion, making it impossible for damage to be done and assets to be compromised. AtomicEye ensures that once detected, no malicious insider can leave with proprietary information; minimizing damage to enterprise systems and keeping critical assets secured.
Triumfant provides continuous protection from advanced malware threats on the endpoint, stopping cyber criminals in their tracks. Offering the most advanced detection capabilities and featuring enhanced memory and Mac features, Triumfant ensures that once inside a company’s or government agency’s systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured. Triumfant stops a breach before it becomes a full-scale attack then automatically repairs the machine(s) and any collateral damage within minutes – no human intervention or system downtime is required. When attacks occur, companies and government entities trust Triumfant to quickly recover and prevent loss. Visit www.triumfant.com.
1 Source: Verizon 2016 Data Breach Investigations Report, Figure 30.