NATIONAL INSIDER THREAT SPECIAL INTEREST GROUP - NITSIG

 

HOME   ABOUT US   MEMBERSHIP  CHAPTERS   MEETINGS   PUBLIC SPEAKING

 INSIDER THREAT NEWS E-MAGAZINE

INSIDER THREAT SURVEYS, REPORTS, INCIDENTS

INSIDER THREAT RISK MITIGATION RESOURCES

INSIDER THREAT SYMPOSIUM & EXPO

INSIDER THREAT RISK MITIGATION VENDORS 

SPONSORS   PRESS RELEASES   CONTACT US

 

 

Insider Threat Program Development - Management Training / Consulting

 

Insider Threat Mitigation Vendors

 

Does your company have a product or service that can mitigate insider threat risks?

Please contact the NITSIG about listing your product or service here. Pricing is very reasonable.

 

 


INSIDER THREAT DEFENSE GROUP, INC.

The Insider Threat Defense Group (ITDG) has become the # 1 Choice Company for Insider Threat Program Development / Management Training and Insider Threat Mitigation Services. We provide a broad portfolio of training and services to potential clients, that will address Insider Threat Risks with a cost effective, comprehensive and holistic approach.


The ITDG has provided training and services to an impressive list of 550+ clients (In Over 14 U.S. States); U.S. Government Agencies (Department of Defense, Intelligence Community), Defense Contractors, Defense Security Service, Critical Infrastructure Providers, Fortune 500 Companies, Aviation / Airline Industry, Spacecraft Manufacturing- Launch Providers, Technology Companies, Banking - Financial Industry, Health Care Industry, and other large-small businesses and global corporations. Client Listing


Over 700+ individuals have attended our training and received Insider Threat Program Manager Certificates.


Our client satisfactions levels are in the exceptional range . We provide our clients with the Gold Standard for successful Insider Threat Mitigation. We encourage you to read the feedback from our clients. Client Comments

 

ITDG Insider Threat Mitigation Expertise

We encourage you to read this document that provides an in-depth overview of our expertise in the various areas of Insider Threat Mitigation.

 

More Information:
www.insiderthreatdefense.us

 

 

 


 

INSIDER THREAT MANAGEMENT GROUP, LLC

  • Mr. Shawn Thompson is licensed attorney, and CEO of the Insider Threat Management Group and Insider Threat Training Academy. (Bio)

  • Mr. Thompson is the Legal Advisor to the National Insider Threat Special Interest Group.

  • Mr. Thompson provides legal guidance on Insider Threat Program development and management, during the highly sought after Insider Threat Program Management With Legal Guidance Training Course.

  • Mr. Thompson provides Insider Threat Program development and management consulting services to an impressive list of clients, to include Fortune 100 clients.

  • Mr. Thompson is a licensed attorney with over 15 years of experience investigating and prosecuting malicious employees, and managing Insider Threat Programs (ITP's). He is widely recognized for his insider threat expertise and unparalleled scope and breadth of experience. Mr. Thompson has been involved with creating and managing ITP's for numerous federal agencies. His work with the National Insider Threat Task Force led to the creation of the National Insider Threat Policy and ITP Minimum Standards for Executive U. S. Government Agencies.

Contact Information
Shawn Thompson
410-858-0006

shawn@itmg.co
www.itmg.co


 

VERIATO
Veriato is an innovator in Insider Threat Detection and a global leader in Employee Monitoring Software. Driven by AI, more than 42,000 companies and government entities worldwide utilize Veriato to gain unmatched insight into the User Activity occurring on their network. Veriato’s product line includes the Veriato Cerebral, Veriato Investigator and Veriato RansomSafe.

More Information
www.veriato.com

 


 

TRANSUNION
Whether federal, state or local agency, public safety or educational organization, TransUnion’s suite of mission-critical solutions provides the public sector with vital information and an unmatched combination of credit and non-credit data to help ensure citizen safety, manage compliance and boost services for constituents served. Our comprehensive and unique sets of credit, criminal and public data, coupled with flexible analytics, help agencies detect and prevent cyber fraud, and make connections between people, businesses, assets and locations.

Our experience has given us a deep understanding of the challenges facing your organization, your service requirements, and the factors that impact your daily operations.

More Information
www.transunion.com/public-sector
www.transunion.com/solution/insider-threat

 


 

DTEX SYSTEMS
Dtex provides organizations across the globe with the complete, user-focused visibility needed to strengthen enterprise security posture and effectively manage insider threats. Dtex’s Modern User Activity Monitoring combines high-fidelity user activity data with machine learning and advanced analytics to pinpoint anomalies in real time, elevate areas of risk, generate actionable insights, and provide answers quickly. Collecting only the lightweight data needed to identify risky behaviors, Dtex can be deployed and scaled quickly with no impact on network, endpoint or human performance and without impeding user privacy.

More Information
www.dtexsystems.com

 


 

HAYSTAX

Mitigating insider threats takes a lot more than just correlating network data. It requires the ability to analyze 'whole-person' behavior — rapidly, continuously and at scale.

Our Haystax For Insider Threat solution was designed from the ground up to:

  • Continuously assesses the trustworthiness of individuals, not just user activity on networks and devices like conventional machine-learning or rules-based solutions.
     

  • Uses a probabilistic model that analyzes evidence from a wide array of data sources to prioritize risk rather than generate excessive false-positive alerts that overwhelm analysts.
     

  • Provides a user interface that mirrors current analyst terminologies and workflows.

  • Includes a connector framework that makes it easy to integrate data and existing detection systems quickly.

Top federal government agencies and large commercial enterprises, as well as state and local public-safety organizations, rely on Haystax for more effective protection of their critical systems, data, facilities and people. A U.S. defense agency has called Haystax for Insider Threat the "only known system for prioritizing personnel according to positive and negative nodes of trust."

More Information
www.haystax.com

 


 

AC GLOBAL RISK

AC Global Risk (ACGR) is a Silicon Valley-based technology company that developed Remote Risk Assessment (RRA®) to uncover human risk across the commercial and government markets. RRA’s capabilities are the output of 10 years of development, 2-year market evaluation, countless customer trials, and formal validation.

Remote Risk Assessment (RRA®) is a sophisticated system that uses unique voice analytics processes to evaluate and quantify distinct characteristics of the human voice related to risk. RRA is a highly accurate, automated, high-throughput risk assessment technology that has been vetted by military and commercial customers.

 

  • RRA takes under 10 minutes - over the phone, remote team, or on-prem

  • Light touch with simple YES / NO responses to 3-6 automated questions - no PII is required

  • Works in any language - already used in English, Spanish, Pashto, Farsi, Tagalog, and Somali

  • 97.62% accurate on latest validation

  • Used for HR screening, counter green-on-blue, counterintelligence, insider threat mitigation, fraud / incident / loss investigations, 3rd party audits, and IP protection.

More Information

www.acglobalrisk.com
 


 

CAPGEMINI

Capgemini’s Arena ITI™ provides organizations of any size with proactive identification of potential insider threat activity, built on industry-leading experience in counterintelligence.

Arena ITI™ is an award-winning solution that takes a holistic approach to detecting insider threats. Arena ITI™ assesses both the employees’ cyber footprint and their non-IT behaviors in a single platform to produce earlier and more accurate insider threat detection by:
 

  • Ingesting intelligence from company and third-party data sources

  • Aggregating data through predefined risk models and scoring

  • Drilling down for advanced analysis, further investigation and reporting

Arena ITI™ is an important part of an Insider Threat program, it provides context and insight for security teams to focus their limited resources on assessing the behaviors of high-risk individuals and intervening prior to the occurrence of a hostile event.

A comprehensive insider risk program requires people, processes, and tools, acting collectively to achieve the greatest benefit and return on investment. Capgemini also provides Insider Risk Assessments and Insider Risk Program Development.

More Information

www.capgemini.com/service/cybersecurity-services

jerry.hunt@capgemini.com

 


 

JAZZ NETWORKS

Jazz Networks simplifies insider threat detection and breach prevention with machine learning and a fully-customizable policy engine. The platform automates employee training the instant they make a mistake, applies policies while data is in motion to prevent data loss, and provides the fastest threat hunting and forensic capabilities for investigations.

 

More Information

www.jazznetworks.com

 


 

MATHCRAFT SECURITY TECHNOLOGIES

MathCraft Security Technologies is the leading provider of innovative software for today’s security professionals. As a trusted partner within the industrial security community, we work with government and corporate organizations of all sizes to streamline operations, maximizing both productivity and efficiency.

MathCraft’s robust product lines are compliant with Defense Security Service (DSS) and NISPOM requirements for cleared contracts and enterprises. Our solutions are carefully engineered to improve security and compliance processes, giving Facility Security Officers (FSOs) and employees the comprehensive tools that they need to manage data, monitor visitors, and automate workflows. For ultimate convenience, they are also available on-premises or via a FedRAMP-approved cloud platform.
 

Access Commander® is our industrial security management software for FSOs who need to govern and organize their security efforts while staying compliant.

ViSi Commander™ is the application that allows FSOs to manage visitors across cleared facilities and streamline the check-in/out process.

Portal Commander™ is our automated, self-service security portal for employees, line managers, FSOs, and CSOs who require improvements, consistencies and accountabilities in security processes. The Business Process Management (BPM) edition includes a workflow engine that allows you to optimize your security processes like never before.

 

With MathCraft’s powerful lines of industrial security applications, organizations can manage their classified facilities, personnel clearances, foreign travel, classified visits, incidents, insider threats, classified contracts, classified documents, badges, training, and more in one place, within applications that make compliance inherent and systemic. Our products save time, reduce costs, and minimize risks for those who stand on the front lines, safeguarding our nation’s most sensitive information and infrastructure.

More Information
www.mathcraft.com
703-729-9022 / Ext. 803

 


 

SECURONIX
Securonix redefines the next generation of security monitoring. Securonix Next-Gen SIEM uses big data architecture to provide unlimited scalability and data retention on a non-proprietary open platform. It leverages machine learning and behavior analytics to detect the most advanced cyber threats.

The solution comes packaged with out-of-the-box content for insider threats, cyber threats, cloud threats, and fraud. It also comes with Securonix Spotter, which supports text-based search, ad-hoc reporting, link analysis, and threat hunting capabilities across massive data sets. Securonix provides incident orchestration and response capabilities with built-in incident response playbooks and case management.

The Securonix solution is available in the cloud as a fully-managed SaaS platform. Securonix is SOC2 certified and supports complete SIEM functionality in the cloud with minimal operational overhead.

More Information
www.securonix.com

 


 

SOLARWINDS
SolarWinds® provides powerful and affordable IT management software to customers worldwide from enterprises of all sizes to virtually every civilian agency and branch of the US Military. We focus exclusively on IT Pros and strive to eliminate the complexity that they have been forced to accept. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem.

More Information
www.solarwinds.com
www.solarwinds.com/federal-government/it-management-solutions-for-government

 


 

ORACLE
Oracle is a leader in security and top provider of 5G, Cloud (DaaS, SaaS, PaaS, Iaas), Java, Data technologies, HCM/ERP/CRM, AI/ML, Emerging technologies, Hardware, and much more.

Oracle technologies specificslly help reduce the insider threat access to highly sensitive data with technologies such as Gen 2 Cloud, Transparent Database Encryption, Key Vault, Database Vault, Audit Vault, Database Firewall, and the Cloud Access Security Broker (CASB).

Oracle enterprise Hardware and Cloud have been selected by Insider Threat and Security Operations Centers at large agencies to run 3rd party COTS software. Oracle hardware is selected for its low cost, high performance, and resiliency in the InT/SOC use case.

More Information
www.oracle.com

 


 

CODE42
Code42 is the leader in data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocking user productivity. Because the solution collects and indexes every version of every file, it offers total visibility and recovery of data — wherever it lives and moves. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42 Next-Gen Data Loss Protection preserves files for compliance and can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

More than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners.
 

More Information
www.code42.com
Read Code42’s Blog / Follow Us on Twitter

 


 

CYBERHAVEN
Cyberhaven rapidly detects and eliminates data incidents caused by insider threats. Cyberhaven reduces the cost of data breaches by rapidly detecting and investigating insider threats. It provides instant visibility into data flows across endpoints, servers, email and SaaS, significantly reducing the amount of time to contain a breach.

More Information
www.cyberhaven.io

 


 

SPLUNK

Splunk drives fast, confident decisions to solve DoD’s toughest challenges and ensure mission success. Its massively scalable analytics platform leverages data from any source or format – satellites, mobile devices, servers, weapons systems and more. It delivers real-time situational awareness and insights that optimize assets and operational capabilities, accelerating mission execution.

 

More Information

www.splunk.com
 


 

OBSERVEIT

ObserveIT, the leader in Insider Threat Management, delivers comprehensive visibility into user and data activity providing security organizations with a powerful tool for protecting employees and valuable assets while saving time and resources. With more than 1,900 global customers across all major verticals, ObserveIT empowers security teams to proactively detect Insider Threats, streamline the investigation process and enable rapid response.

 

More Information
www.observeit.com

 


 

YAKABOD
Yakabod’s CISOBox and Yakabox software provide secure software for insider threat case management, file sharing and other business processes. The company’s products provide insider threat teams with efficient, productive, repeatable business processes for managing, tracking and documenting insider threat investigations, as well as for communicating with investigation teams and stakeholders. Built on technology created for, certified (Under NIST RMF) by and used in U.S. Federal Intelligence Agencies, Yakabod’s solutions provide comprehensive security to protect sensitive, high stakes insider threat case data from both external and internal threats and to minimize the risk associated with improper access to or disclosure of sensitive insider threat information.

More Information
www.yakabod.com

 


 

 

Copyright © 2014 - National Insider Threat Special Interest Group ™ - All Rights Reserved - Legal Notice