Veriato Insider Threat Intelligence Platform

Additional Info

CompanyVeriato Inc.
Websitehttps://www.veriato.com
Company size (employees)50 to 99
Type of solutionSoftware

Overview

The Veriato Insider Threat Intelligence Platform (ITIP) combines the machine learning (ML) power of Recon’s User & Entity Behavior Analytics (UEBA) and the detailed investigative visibility of 360’s User Activity Monitoring (UAM) in one unified platform.

Large enterprises, government agencies, financial organizations and healthcare providers can leverage the ML strength of Veriato to look for anomalous risk behaviors in the enterprise and respond with the detailed evidence provided by the Veriato client on every endpoint in the enterprise – whether Windows, Mac, Android or terminal servers such as Citrix XenApp or Windows Remote Desktop Services. View the entire context of a breach or unauthorized data access with DVR playback of all user activity. Veriato can block data loss using the Veriato Data Loss Prevention features such as blocking cloud file uploads, website access and unwanted application use. Deter deliberate malicious acts using Veriato’s login warning and keyword alert User Notification capabilities.

Veriato’s Insider Threat Protection technology helps businesses, regulated industries, and government agencies achieve compliance and data governance of critical or sensitive intellectual property, customer data, patient information, financial data and other critical information.

How we are different

The Veriato Insider Threat Intelligence Platform combines UEBA, UAM and incident response into a single powerful insider threat security platform giving businesses unparalleled visibility into the activities of authorized users with access to sensitive data. Veriato is used by major regulated industries and businesses subject to data protection and compliance regulations such as CCPA, GDPR, PIPEDA and the NY Title 23 Data Protection regulations.


Because Veriato watches and records the users’ actual onscreen actions, we don’t have to speculate or try and deduce the what happened when a breach is detected. Additionally, this video visualization becomes a crucial part of the evidence chain when prosecution is warranted. Veriato User Notifications, such as logon warning, always-on recorder system tray icon and keyword alerts to the user provide a deterrence to authorized users who may be considering deliberate malicious acts against sensitive enterprise data. Breaches are not only alerted but enterprises can block the leak using Veriato’s Data Loss Prevention features to block cloud uploads, website access and application use.


Veriato’s Insider Threat Protection technology helps organizations uncover fraudulent abuse within the perimeter and take action. For example, in 2018 Veriato was used by Miami-based Jeg & Sons, a Top 50 Amazon seller, to uncover employee theft and enabled law enforcement with an evidence chain to act swiftly. Damages recovered approximated $1.2 million which was a 2400% return on investment for this customer.