Retail & Ecommerce Cyber Security

Unified User Activity Monitoring, Information Security and PCI Compliance in a Single Solution

Teramind for Retail
& E-Commerce

The retail and e-commerce industry faces a growing risk of cyber security breaches and stolen information. Target, Wal-Mart, TJX, Home Depot, eBay - all have been hit by data breaches.

Reports suggest that each breached data record costs retailers on average $116. PCI can charge hefty penalties if the retailer is found to violate the mandatory PCI DSS compliance requirements. There are other opportunity costs to consider as well; possible civil litigation, customer churn, suspension of account by payment providers etc. and sometimes, a large dent in brand reputation. In fact, a data breach has one of the top three negative effects on brand reputation.

Online retailers and e-commerce sites are even more susceptible to cyber-attacks and data breaches due to their exposure on the public internet and the Cloud. They are also increasingly capturing a vast amount of personal information, behavioral and tracking data to enable personalized experience to their customers. This means, they now have to protect volumes of different data types. It also means, when a breach occurs, they are held liable. PCI standards show that the average cost of a breach for a large website is 4 million dollars. It’s not exactly cheap at $86,500 for an SMB/SME either; especially when fallout from such a breach can put their very existence at risk.

Retailers need to implement strict restrictions on data access, monitor employees who work with sensitive information, and have the capability to identify insiders, often the main cause of cyber security breaches, whether intentionally or inadvertently.

Teramind Addresses Activity Monitoring, Threat Detection, Data Loss Prevention Needs with a Single Unified Solution

Teramind has been assisting retailers from department stores, supermarket chains to speciality stores such as fashion haute couture, e-tailers, drop-ship businesses - both large and small, protect their customer data, financial transactions, personal information and trade secrets. Teramind for Retail and Ecommerce comes with:

  • Real-Time User Activity Monitoring: provides granular visibility across your team, departments and vendors 24/7.
  • Endpoint Data Loss Prevention: secures sensitive data residing in Point-of-sale (POS) systems, back-office workstations, shared over the network or on the Cloud.
  • Risk-Based Insider Threat Prevention: thwarts any sabotage, collusion or other malicious intent by employees and privileged users.
Teramind for Retail and Ecommerce value diagram

The Retail & E-Commerce Sector is Affected by Major Data Breaches, Card Frauds and Other Cyber Crimes:

Retail is a Prime Cyber Crime Target, Especially in the U.S.
A 2018 study found, three quarters (75%) of U.S. retail have been breached at least once in the past, ahead of 60% for Global retail. Source: Thales.


of U.S. Retail was Breached at Least Once in the Past

Data Breaches Affect Customer Loyalty Significantly
A global survey of 10,000+ people found, If a company suffered a data breach, 70% of consumers would stop doing business with it. Source: Gemalto.


of Consumers Would Abandon a Breached Business

E-commerce Sites are Used by Hackers Using Stolen Data
A recent report showed that 80-90% of the people who log in to a retailer's e-commerce site are hackers using stolen data. Source: Shape Security / Business Insider.


of E-commerce Site Users are Hackers in Disguise

Card Fraud Losses will Affect Banks and Merchants
According to a report, card fraud losses by banks and merchants worldwide are expected to rise to $32.82 billion by by the end of 2019. Source: Nilson.


Estimated Global Card Fraud Losses by 2019

Teramind Helps Retailers Protect Sensitive Data:

Brick & Mortar Stores
  • Personally Identifiable Information (PII): name, address, social security number, date of birth, driver's license etc.
  • Payment Card Industry Data Security Standard (PCI DSS) i.e. cardholder data, CC no., debit card no., CAV/pin, magnetic code, SWIFT/ABA/routing etc.
  • Supplier/vendor contracts.
Online Retailers / Ecommerce
  • Customer data – PII + PCI.
  • User preferences and buying patterns.
  • Business processes.
  • Session logs, site cookies, customer credentials, support pin, black/white listed IPs, public keys etc.
  • Saved shopping buckets, promotion, discount and loyalty codes.
Corporate Data
  • Business processes and strategic plans.
  • Price/cost/supplier/customer lists.
  • Source code, formulas, patents and other type of IPs.
  • Acquisition plans, M&A announcements, legal documents and other confidential matters.
  • Payroll, accounting and financial data.
And more...
  • Billing/invoice, tax/VAT, GST/HST, enrollment and payment related data.
  • GDPR special data categories (trade union data, biometric, geo location).
  • For Official Use Only (FOUO), Confidential and Protected file tags.
  • Federal Tax Information (FTI), Covered Financial Information (GLBA) etc.

Teramind Delivers Data Security, Customer Protection and Compliance for Your Retail Operations

Real-Time Visibility and Control

Teramind visually records every action that a user makes for over 12 objects including screen, apps, websites, files, emails, etc. Uncover what your employees are up to both online and offline. Each object can be configured to take into consideration what needs to be monitored and who has access to the monitored records. You can specify who you want to monitor, how much you want to monitor, when and for how long. This allows for instant administrative oversight in respect to all user activity while complying with any privacy requirements.

Sensitive Data Discovery and Classification

Teramind has built-in templates for many classified and unclassified data types including Personally Identifiable Information (PII), Protected Health Information (PHI), Personal Financial Information (PFI), card holder data, banking codes etc. Custom data types specific to your organization can be easily created using regular expression (RegEx) and natural language definitions. Combine OCR and fingerprinting with multiple logic, file origin, file properties and data content to discover classified information in structured/unstructured data or even images ‘on the fly’.

Powerful Policies and Rules Engine

The core of the Teramind platform is its automation. Teramind comes with hundreds of pre-defined policies and rules. For example: block email containing sensitive keywords, stop uploading of a confidential document, detect screen capture, prevent the use of external drives etc. The templates cover virtually every use case of data loss prevention, insider threat detection and compliance requirements. Just pick a policy or rule template and all the data definition, content source, condition will be set automatically for you to edit.

Data Loss Prevention & Egress Control

Teramind helps you put exfiltration and egress controls in place to prevent illicit sharing of information. For example, use the File Transfer rules to block external drives. Use Clipboard rules to prevent sharing of confidential information like customer data outside the CRM. Utilize Network rules to restrict download/ upload operations in the Cloud for certain file types or all files (no need for separate Cloud Access Security Brokers). Or use dedicated Social Media and IM rules to prevent potential data leak by social engineering. There are hundreds of use cases where Teramind can proactively defend your data from malicious or accidental leaks or misuse.

Behavioral Anomaly Detection

Define what constitutes dangerous or harmful user behavior and Teramind’s sophisticated anomaly engine will automatically detect when a user, department or group deviates from their normal parameters or exceeds acceptable risk levels. Teramind can detect anomalies in applications, emails, network, file activities, printing and more. Immediately get notified about harmful user activity, lock out user or take remote control of the compromised system before any malicious or fraudulent attempts are made.

Privileged User and Third-Party Monitoring

Teramind allows organizations to create profiles for privileged users, contractors and other third-parties and then define what information and system resources each profile can access. Further rules can be set up by behavior policies so that access to sensitive information is segregated by the organization’s security policy, or on a need-to-know basis. Rules can also be created to notify the authorities of any suspicious privileged user activity, such as unscheduled and/or unauthorized changes to system configuration, and creation of backdoor accounts.

Security Sandbox

Teramind allows you to create virtual servers on Windows, VMware Horizon etc. Utilizing this capability, you can for example, set up a Terminal Server for POS or vendors and back office workstations Users can then login to the server using RDP keeping out of your internal network and repositories. At the same time, you can record their activates separately, restrict access or take control of the server in case of an incident keeping rest of your business immune to disruption.

Digital Forensics and Auditing

Detailed alerts for all users can be viewed including any security incidents and what actions were taken. Warning messages can be configured to inform the users about nonconformity and influence corrective behavior. Session recordings and history playback can be used to view user’s desktop for audit and evidence gathering purposes.

Risk Assessment and Treatment

Teramind has a dedicated Risk dashboard where the CSO and security analysts can conduct organization-wide risk assessment. Risk can be profiled by users, departments or by system objects. Reports can be derived by severity of risks or by how many times security violations occurred. Unique Risk Scores helps you identify high-risk users or policies so that plans can be developed for treating the risks.

Compliance Management for PCI DSS, SOX, FFIEC and More

Teramind comes with PCI DSS specific policies and rules addressing many of the steps necessary to maintain the Data Security Standard for Merchants & Processors. You can also customize Teramind to support special compliance requirements for SOX, PCAOB, GDPR, FCPA/UK as well as any state data privacy and notification laws applicable to your organization with its powerful Policy & Rules Editor and various monitoring and reporting capabilities.

Teramind is Ranked #1 by:

And others.

Have a Look

Flexible Deployment Options

On-premise - control the Teramind implementation in its entirety, stay off-cloud if that’s your firm’s operational model, leverage LDAP groups and users to identify which users and groups to apply which policies and rules to.

Teramind Private Cloud - use your own secure, scalable private cloud implementation including AWS, Google Cloud, Azure and more.

Teramind Cloud - trust us the management of the Teramind deployment and infrastructure. Only install Teramind Agents on the machines you want to monitor and set up your users, policies and rules and let us take care of the rest.

Interested? Try it! take a guided tour