How Syteca can help you fight insider threats
With a great feature set that includes robust monitoring and incident response capabilities, Syteca can serve as a solid foundation for any insider threat program. The main features it offers include:
Monitoring
Syteca provides full video recording of the user screen, including mouse movement. All recordings are stored in a centralized database in an indexed format, specifically optimized for low storage and bandwidth requirements.
Along with video recording, Syteca also records numerous additional metadata, such as keystrokes, names of windows opened and applications launched, websites visited, commands executed in Linux, connected devices, etc. There are extensive options for filtering recording, allowing recording to start automatically, recording only at specific times, or even recording only certain applications.
Any recording can be reviewed at any time along with the corresponding metadata via a convenient web-based management tool. Recordings are easily searchable, allowing for easy investigation and analysis.
Detection
Syteca monitors all Windows server and desktop, macOS desktop, Linux SSH/Telnet, and various Unix sessions regardless of the level of privilege a user has, or the applications or network protocols used. Automatic license provisioning makes Syteca ideal for virtual environments, as it allows the redistribution of licenses automatically as you shut down and create new virtual machines.
Apart from multi-factor authentication, privileged account and session management (PASM), one-time passwords and other access management features, the platform includes a secondary authentication tool. Secondary authentication is used to distinguish between users of shared accounts, allowing Syteca to clearly attribute each recording to a specific user.
Syteca also features robust alerting capabilities to facilitate incident detection. It has a set of built-in predefined alerts, specifically designed to cover most common incidents linked to insider threats. Users can also create custom alerts based on their specific needs and situation.
When an alert is triggered, a notification will be sent to your security personnel, allowing them to quickly review the incident and issue an appropriate response.
Response
When an alert is triggered, security personnel will receive a notification with a link to the corresponding session recording. If the session is still ongoing, then it can be viewed live, and if malicious activity is detected, the user can be blocked immediately. For high-risk actions, you can configure automatic user and/or process blocking when the corresponding alert is triggered.
Apart from allowing users to be blocked manually, Syteca can also monitor and optionally block any USB devices connected automatically. This allows you to protect your infrastructure from mass storage devices and infected USB drives.
Reporting and analysis
Syteca has a number of built-in reports that can be both scheduled and generated manually, allowing you to prove compliance and quickly assess the effectiveness of your insider threat program.
The data collected is also a great asset for investigation and analysis. Syteca allows you to export any part of a recording in a fully protected and encrypted format that guarantees that the said data has not been tampered with. This data can be used as evidence in an official investigation. The internal Management Tool Log also guarantees that system administrators have not tampered with the data