Threat Analysis

Automatic analysis of crucial actions.

Datasheet
Threat Analysis

Threat Analysis Datasheet

What is the Threat Analysis feature?

The Threat Analysis feature is a solution dedicated to continuously monitoring the environment to detect and promptly alert on any suspicious activities executed using privileged credentials. This allows the security team to proactively prevent ongoing attacks.

Benefits

Significantly lower response time to attacks;
Automatic blocking of stolen privileged credentials;
Increased visibility into threats associated with privileged accounts;
Access to all information associated with the incident.

How It Works

Suspicious commands and behaviors are categorized by risk level. Upon detection of risks, alerts are generated and presented on a visual dashboard. This enables the information security team to take prompt action as needed.

Features

Graphic dashboards with risk and threat information;

Alerts with detailed information about the occurrence of suspicious activity;

User session analysis with record of abnormality in reports;

Audit, command alert, and blocking capabilities, even for privileged users;

Recording of command input and output logs;

Command scoring according to the level of risk of each command;

Identification of lateral movement and privilege escalation;

Suspicious activity alerts sent to SIEM/SYSLOG.

Technical Features

Machine history and user behavior analysis to identify any change that represents a threat;
Scoring, monitoring, alerting, and command blocking based on whitelist and blacklist;
Automatic response for detection of threats without human intervention.
Companies Across 60+ Countries Trust senhasegura
Ephicient logoOE logoThe Paak logoThe Paak logo
AriseHealth logoOE logoEphicient logoToogether logo2020INC logo

Request a Demo or Meeting

Discover the power of Identity Security and see how it can enhance your organization's security and cyber resilience.

Schedule a demo or a meeting with our experts today.
70% lower Total Cost of Ownership (TCO) compared to competitors.
90% higher Time to Value (TTV) with a quick 7-minute deployment.
The Only PAM solution available on the market that covers the entire privileged access lifecycle.