Preempt Eliminates Security Threats in Real-TIme
Let our Customers Tell You Why Preempt.
“Detection only solutions today are not enough. We needed a proactive solution to help us get ahead of threats. Preempt’s approach of being able to adapt and automatically prevent threats based on identity, behavior and risk has provided tremendous value.The ease of deployment and extensibility of its platform also helps enable us as we move to more cloud based applications and infrastructure.”
Head of Global Information Security, Manufacturing Company
“We looked at least 4 other UEBA solutions. None of the others allowed us to block and respond to threats in real-time. This was the driving factor for us selecting Preempt.”
“We reduced the amount of time spent on incident response by about 30-40%.”
CSO, Legal Services Firm
What Makes Us Different?
Going forward, enterprises will need to embrace a continuously adaptive approach to information security because in an increasingly digital business world, binary decisions – black or white, allow or block – will not work. Enterprises have to think about how to enable transactions when all the information is not available or there is a known level of risk. Making adaptive decisions based on identity, behavior and risk will enable more effective threat prevention. Preempt enables this transformation.
Enterprises are dynamic and identities are complex. Security organizations often don’t know or are often the last to find out when people’s projects change, or when users move from one department to another. This lack of visibility over who has access to systems and applications, and more importantly, which access is no longer required. Over time, it becomes difficult to distinguish between legitimate and suspicious access. Identity matters. With Preempt, you can gain full visibility into identity and security can adapt in real-time. Every transaction can be evaluated for risk. This eliminates threats like credential compromise and ensures legitimate access can be granted with more confidence.
Behavior Drives Adaptive Response
Once you get past role-based Identity like Privileged users, regular users, executives, contractors, etc., the behavior behind the identity is just as important. Preempt learns behavior of all of the users and entities in an organization to set a baseline of what is normal so that it can better detect anomalies. The challenge is that threats aren’t always black or white. While UEBA is a technology that can help detect anomalous behavior, it is not enough. After baselining behavior, Preempt takes it a step further and responds in real-time when anomalous behavior is detected. A graduated and adaptive scale of responses is required and a flexible policy ensures the right level of response. A grayscale set of responses – Allow, Email Notify, SMS, Isolate, MFA, Block, etc – that adapt based on changes in behavior along with flexible policy ensures that enterprises can customize responses to their specific enterprise security policies.
Layering in Risk-Based Assessment
Lastly there is risk. Assessing and understanding risk factors such as activity, password strength, location, encryption levels, asset value, and more can help with driving smarter security decisions and responses. When you combine identity, behavior and risk, what you receive is a view that allows you to make effective, real time and even predictive decisions on whether to allow, restrict or more importantly, verify identity to enable the business process if the person is who they say they are and allowed to do what they need to do.
Preempt with Confidence
Strategies are shifting to become continuously adaptive and responsive in real-time to threats that will require more situational context. The Preempt Platform enables a transition for more accurately identifying anomalies by analyzing the behavior, the type of user, trust, application and asset being targeted, which is severely lacking in the market today. Responding to threats by combining identity, behavior and risk is a necessity as the enterprise perimeter dissipates and static policy based solutions to identify and respond to evolving threats are ineffective.