HOME


ABOUT US


COUNTERESPIONAGE TRAINING COURSE


INSIDER THREAT

RISK ASSESSMENTS


INSIDER THREAT

RISK MITIGATION

TECHNOLOGIES


REFERENCE SECTION


CONTACT US


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

joomla counter

 

 

INSIDER THREAT RISK MITIGATION TECHNOLOGIES        

The purpose of this page is to list companies that provide Insider Threat Risk Mitigation Technologies that may be used to detect, deter or mitigate Insider Threats.

 

Companies may advertise in this section of our website. Our rates for advertising are very reasonable and affordable. The CEUS website receives a high volume of traffic. For adverting rates please contact us for further information.

 

See: Insider Threat Auditing-Monitoring Recommendations

 


COMPANIES PROVIDING INSIDER THREAT RISK MITIGATION TECHNOLOGIES 

 

VERDASYS DIGITAL GUARDIAN

Enterprise Information Protection

Verdasys Digital Guardian provides insider threat detection, deterrence and prevention with the ability to scale from hundreds to millions of users. Digital Guardian captures forensically-rich intelligence and ensures total operational awareness and control over the use of classified data across all clearance levels with minimal storage, CPU and network utilization. 

 

Digital Guardian supports user, application, and file-level controls: Once users are authorized to access protected data, Digital Guardian allows them to perform a wide range of file and application operations based on file classification and user clearance, ranging from copy/move/save as to removable media, upload, email, print, burn to CD, copy and paste, etc. Verdasys Digital Guardian Insider Threat solutions support “share to win” policies out-of-the-box by monitoring and controlling user-level access to data, while also protecting and deterring unauthorized uses once a file has been accessed.

 

Verdasys Digital Guardian Insider Threat Data Sheet

Verdasys WikiLeaks White Paper

Verdays Information Protection In Virtualized Environments

Verdays Mobile Device Security And Data Protection

Digital Guardian for Advanced Persistent Threat (APT) Detection, Mitigation, and Prevention White Paper

Verdays Advanced Persistent Threats and Cyber Attack Defense

Verdasys Digital Guardian Website

 


 

DOCUMENT DETECTIVE

The best Deep Inspection / Cleansing Tool available for Microsoft Word, PowerPoint and Excel. Document Detective was designed specifically to prevent inadvertent data disclosures when classified Government or Business documents are downgraded. The software can identify and sanitize more than 100 types of hidden data, including Ad Hoc Review data, Meta data, tracked changes, comments, embedded object linking and embedding (OLE) files, embedded objects and object fragments.             

Document Detective Website

 


DISCLAIMER:

Any information provided in this section is provided "as is" and without “warranty”. In no event will the operators of this website be liable for any problems caused by these recommended Insider Threat Mitigation Technologies and any damage you suffer, including, but not limited to, destruction of data or damage to your equipment, whether such damage is direct, incidental or consequential, and whether caused by mistake, omission, interruption, deletion of files or messages, errors, defects, delays in operation or transmission, failure of equipment or performance, negligence or otherwise. You agree to indemnify and hold the operators of this website harmless against any and all claims or liabilities arising out of use of any information provided on this page by you or by anyone directly or indirectly obtaining such information through you.


enterprise, insider threat, computer, auditing, monitoring, software, data, information, loss, leakage, leaking theft, breach, detect, detection, prevent, prevention, protect, protected, protecting, protection, information assurance, host, based, endpoint, digital, rights, management, enterprise, insider threat, insider, threat, computer, audit, auditing, monitor, monitoring, software, tools, data, information, loss, leakage, leaking, leak, theft,  breach, breaches, forensics, spills. classified, top secret, topsecret,  secret, sensitive, user, users, employee, control, activity, activities, privileged, users, activities, privileged users activities, database, ediscovery, discovery

 
 

            Copyright © 2011- 11- COUNTERESPIONAGE.US - All Rights Reserved - Legal Notice