![]() |
User Privilege Puts Sensitive Data at Risk |
According to a survey of 400,000 member online, user privilege and increased sensitive data are main risk enablers. Source: Cybersecurity Insiders. | |
37% |
Excess Privilege |
34% |
Increased Amount of Sensitive Data |
![]() |
Majority of Enterprise Breaches Involve Privileged Accounts |
A survey of 1,000 IT decision makers in the U.S. and the U.K. confirms that 74% of enterprise breaches involved privileged accounts. Source: Centrify. | |
74% |
Enterprise Breaches Involved Privileged Credential Abuse |
![]() |
Privileged Users are One of the Biggest Security Risks |
In a recent survey, 55% mention that privileged IT users/admins pose the biggest insider security risk to their organization. Source: Crowd Research Partners. | |
55% |
Of Companies Say Privileged Users are Their Biggest Insider Threat |
![]() |
Systems Logs and User Data are Critical for Security Analytics |
47% IT pros think login data and 41% think private activities on coproprate devices are most important from a security point of view. Source: Cynet. | |
47% |
Login Date and Time |
41% |
Private User Activity on Company Devices |
![]() ![]() |
System-Wide Monitoring & ControlTeramind visually records every action that a privileged user makes on your IT systems including endpoints, servers/terminal servers, network and the Cloud for 12+ system objects like: web, apps, email, file transfers, etc. Uncover what your users are up to both online and offline. Each object can be configured to take into consideration what needs to be monitored and who has access to the monitored records. This allows for instant administrative oversight in respect to all user activity while complying with any privacy requirements. |
![]() ![]() |
Intelligent Policy & Rules EngineThe core of the Teramind platform is its automation. Teramind comes with hundreds of pre-defined policies and rules. For example: block email containing sensitive keywords, stop uploading of a confidential document, detect screen capture, prevent use of external drives etc. The templates cover virtually every use case of data loss prevention, insider threat detection and compliance requirements. Just pick a policy or rule template and all the data definition, content source, condition will be set automatically for you to edit. |
![]() ![]() |
Real-Time Alerts and NotificationsReal-time alerts and trend reports show what rules were broken, when, by whom, what action was taken and the context. Receive instant warning or scheduled notification emails of suspicious user activity. Search for all users or a particular user or group activity. Or, setup a monitoring widget on the dashboard for real-time update of the online employees. |
![]() ![]() |
Behavioral Anomaly DetectionDefine what constitutes dangerous or harmful user behavior and Teramind’s sophisticated anomaly engine will automatically detect when a user, department or group deviates from their normal parameters or exceeds acceptable risk levels. Teramind can detect anomalies in applications, emails, network, file activities, printing and more. Immediately get notified about harmful user activity, lock out user or take remote control of the compromised system before any malicious or fraudulent attempts are made. |
![]() ![]() |
Remote Desktop ControlA user's ability to access a desktop can be instantly taken away by putting Teramind's remote control feature to use. Manually overriding an account removes the user from the equation, ensuring that activity is contained, and potential threats are eliminated. Remote control can be started by simply clicking on the remote icon on all live sessions. Override all manual inputs by a user to prevent sensitive data from being altered and data breaches from occurring. |
![]() ![]() |
Authentication and Access ControlIdentity based authentication and segregated access control prevents unauthorized access or sharing of confidential data. You can setup an access account for each privileged user that is going to need authorized clearance and easily track what each user is doing at any given time. With group profiles, you can create different access levels based on departments, job function or source of access (i.e. remote/third-party etc.) and then define what information and system resources each group can access. |
![]() ![]() |
Session Recording and AuditTeramind visually records every action that a user makes while on a machine, allowing for both live viewing and pas recordings. Extensive meta data and fast indexing allows past incidents to be searched and retrieved in seconds. Optional audio support for the recording of both sound outputs and inputs, ensuring that all audio coming from speakers and microphones is captured. Recorded files can be exported and downloaded as MP4 files. Immutable session logs and systems logs can be exported as PDF/CSV file or sent to a log monitoring and analytics software like LogRythm. |
![]() ![]() |
Risk Analysis and MitigationTeramind has a dedicated Risk dashboard where supervisors can conduct organization-wide risk assessment. Risk can be profiled by users, departments or by content. Reports can be derived by severity of risks or by how many times security violations occurred. Unique Risk Scores helps you identify high-risk users or policies so that plans can be developed for treating the risks. |
![]() ![]() |
IAM/PAM/SIEM IntegrationEvent triggers and logs from Teramind can be sent to SIEM and other analytics tools like HP ArcSight, Splunk, IBM QRadar, McAfee Enterprise Security Manager, LogRhythm, NetIQ Sentinel etc. allowing you to share reports and threat intelligence with your security team or other departments. Teramind also has a set of RESTful APIs utilizing a simple token/endpoint framework that can be easily utilized by access/identity management (IAM/PAM) applications to create a single sign on (SSO) policy or share logs. |
On-premise - control the Teramind implementation in its entirety, stay off-cloud if that’s your firm’s operational model, leverage LDAP groups and users to identify which users and groups to apply which policies and rules to.
Teramind Private Cloud - use your own secure, scalable private cloud implementation including AWS, Google Cloud, Azure and more.
Teramind Cloud - trust us the management of the Teramind deployment and infrastructure. Only install Teramind Agents on the machines you want to monitor and set up your users, policies and rules and let us take care of the rest.