Oakley Networks' activity-monitoring agents stops information leaks at their source
Oakley Networks’ ITM (Insider Threat Manager), an unobtrusive server-agent solution, provides enterprisewide monitoring of workstations and laptops, even those used remotely or wirelessly. Because ITM blocks policy violations at the source -- before the information ever reaches your network -- it promises to be one of the more effective ways to stop intentional and unintentional insider data leaks.
Policies are especially robust, from blocking use of removable media and shutting down a workstation to generating a simple warning. Using the Rule Wizard, I easily specified actions that triggered these responses, and created notifications such as pager alerts.
The strongest monitoring mode, Collect All, is typically used to investigate specific users or monitor groups with access to especially sensitive information. In this setting, the system recorded every keystroke related to my Web activities, IM conversations, edits of a Microsoft Word document, and data moved to a USB drive (including saving an archive of the actual file).
ITM’s “Contextual Session Recording” was particularly impressive. Taking the helm at the auditor’s console, I replayed every one of the previous actions, down to text I deleted from the Word document before resaving it.
In more general use, ITM monitored my test computers and generated alerts when it sensed activity counter to my policies — such as sending insider trading information from a free e-mail account or trying to encrypt proprietary client data and e-mail it via Outlook. Alerts can be set to one of five levels of severity.
Providing Tivo-like activity recording, flexible rules, and the capability to sense both pre- and post-encryption actions on the desktop, ITM deserves a look from any company with heavy-duty data protection needs.
Insider Threat Manager 3.0
Oakley Networks, Inc.
Though they get a lot of coverage in the press, these smartphones should not be on your list when it's...
Supreme Court's decision is bad news for developers targeting the U.S. market, who will now have to...
The transition from command line to line-of-command requires a new mind-set -- and a thick skin
Windows diehards take note: Win10 is more than a misguided mash-up of Win7 and Win8
Windows 10 isn't all Cortana and the Start menu, you know. Follow the ninjacat to find the best stuff...
Windows 10 is what Windows 8 should have been, but it has too many rough edges to attract Windows 7...
In the wake of the OPM data breach, another grim reminder of the folly of hobbling encryption