Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

Security Weekly – Hack Naked News Podcast – Featuring Preempt Customer Testimonial

Today’s retailers are continually faced with security challenges impacting both employees and customers.

That’s why behavioral monitoring is one of the most critical security tools retailers can use. Preventing both fraud and insider threats, while also improving the security around the customer experience — i.e., requiring additional validation or authentication from “risky” customers and purchases, or lowering the security requirements for customers and employees with less risk to make their experience better — is essential.

preempt-hack-naked-news

In a September interview with Security Weekly’s Hack Naked News podcast, Grant Sewell, Director of IT Security at Safelite AutoGlass, discusses how identity is one of the most important security controls in the cloud for retailers — and how the company’s use of the Preempt Platform is central to providing the required analytics around identity and users.

Broadcasting from the RH-ISAC Cyber Intelligence Summit in Denver, Colorado (U.S.A.), Grant talks about how Preempt helps enterprises improve security and brings together disparate environments like the cloud, a traditional datacenter, and third parties. Using the Preempt Platform can help security teams make better decisions and increase the overall security of a retailer, he says.

Watch his conversation below to learn more about risk-based security and identity controls for retailers, and how information sharing and analysis centers and organizations (ISACs) like the Retail & Hospitality ISAC are focused on industry-wide resilience, and can assist with valuable and measurable success in enterprise risk management.

The interview begins at the 12:30 mark.

Upcoming Security Weekly Webcast: Featuring Preempt

Organizations adopting cloud services face challenges of visibility and control that cause increase unauthorized access and therefore widen the organizational attack surface, especially in hybrid environments.

In a free webinar Oct. 17 by Security Weekly, Ajit Sancheti, CEO of Preempt Security, will talk about how organizations can use their identity solutions to create behavioral models of a user and auto-remediate threats when detected, whether it’s on-premises or in the cloud, making your hybrid enterprise environment easier to manage and more secure.

Register now for Achieving Conditional Access That Protects Every Account In Your Hybrid Environment.

Topics: Adaptive Threat Prevention, Cloud, Compliance, Conditional Access, Identity, Identity Verification, Insider Threat, PCI,

Posted by Lynn Christiansen Esquer on September 30, 2019 11:49 PM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More