Veriato Insider Threat Intelligence Platform

Additional Info

CompanyVeriato Inc.
Websitehttps://www.veriato.com
Company size (employees)50 to 99

Overview

The Veriato Insider Threat Intelligence Platform (ITIP) combines the machine learning (ML) power of Recon’s User & Entity Behavior Analytics (UEBA) and the detailed investigative visibility of 360’s User Activity Monitoring (UAM) in one unified platform.

Large enterprises, government agencies, financial organizations and healthcare providers can leverage the ML strength of Veriato to look for anomalous risk behaviors in the enterprise and respond with the detailed evidence provided by the Veriato client on every endpoint in the enterprise – whether Windows, Mac, Android or terminal servers such as Citrix XenApp or Windows Remote Desktop Services. View the entire context of a breach or unauthorized data access with DVR playback of all user activity. Veriato can block data loss using the Veriato Data Loss Prevention features such as blocking cloud file uploads, website access and unwanted application use. Deter deliberate malicious acts using Veriato’s login warning and keyword alert User Notification capabilities.

Veriato’s Insider Threat Protection technology helps businesses subject to GDPR, CCPA, HIPAA and other data protection regulations such as New York Title 23 achieve compliance and data governance of critical or sensitive customer data and other critical information.

How we are different

The Veriato Insider Threat Intelligence Platform combines UEBA, UAM and incident response into a single powerful insider threat security platform giving businesses unparalleled visibility into the activities of authorized users with access to sensitive data subject to data protection and data compliance regulations.


Veriato helps businesses protect against accidental or malicious data exfiltration by blocking application use, website access, cloud file uploads and other leaks keeping regulated data safe.


Veriato helps businesses raise employee awareness and deter breaches by authorized users with configurable logon notifications, user alerts when suspicious actions are detected and with an always-on notification.