{"id":37353,"date":"2024-01-16T06:42:36","date_gmt":"2024-01-16T13:42:36","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=37353"},"modified":"2025-08-22T02:38:09","modified_gmt":"2025-08-22T09:38:09","slug":"insurance","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/industries\/insurance","title":{"rendered":"Cybersecurity Solutions For Insurance Companies"},"content":{"rendered":"\n\t\t<div  class=\"block-d4931686-86f3-4e8d-8224-4e75d632d35f areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(14, 70, 107,0.16)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054235\/hero-pic.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-50a79949-ae91-41cc-ad4d-bfbeb46fadd4 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-89572014-079c-4804-8099-0f7936be7418 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-195e9bd3-8e2c-43b5-b0ec-277cf2270431 col areoi-element my-5\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4 has-white-color has-text-color\">Insider Threat Prevention for Insurance Companies<\/h1>\n\n\n\n<p class=\"has-text-align-center mb-5 mx-auto text-18-15 p-poppins has-white-color has-text-color\">Monitor user activity, manage access, and streamline incident response in your<br> insurance organization with a full-cycle insider risk management platform.<\/p>\n\n\n\n\t\t<div  class=\"block-a5b98f32-f31c-4f08-b237-d040d0b7ad23 areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center mt-md-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-67bd3125-4f9a-400c-8eb5-86a265d95b1f btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-12de22e3-0186-44e1-a196-b77ecdc396ff btn areoi-has-url position-relative  mb-3 btn-outline-light\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d2e33a46-5e5e-42d9-bfec-7f2aca53b070 areoi-element main-numbers\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6918c5bb-a474-45b3-9f7c-8b42f6950f03 areoi-element container mx-sm-auto w-auto\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4e5631df-37a2-4cf7-aa5a-519ff1c8fde6 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f71aed47-0479-47bb-b2e8-3922c70657b5 col areoi-element d-flex col-12\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2f6c49d1-79c5-4acd-a0ff-7e32c0945bbf areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">The challenge<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Company insiders are <strong>behind 34% of data breaches in the financial and insurance industries<\/strong>, states Verizon\u2019s 2023 Data Breach Investigations Report. The behavior of your employees can also contribute to external attacks such as phishing and credential theft. Consequently, insurers are looking for cybersecurity services for insurance companies to manage insider risks and address the following challenges:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfafbc1d-f582-4710-99ba-024cbfc2eadc col areoi-element d-flex shadow-none col-12\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4fc16947-f010-4140-b95d-409816583160 row areoi-element w-100 row-cols-1 row-cols-lg-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9bdc4227-397a-44e2-93e2-a59a96d6b507 col areoi-element col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4cbd95bb-0a7e-403b-a52d-483d45761a4c areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Se\u0441uring sensitive customer data from cyberattacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c40663b-6174-467e-aa61-6a63596eaa76 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Preventing cases of fraud and privilege abuse<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c78a9424-02ee-4f5e-b0d2-b0b5a96f2cf7 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Overcoming vulnerabilities of legacy systems in the insurance sector<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bdf6eae8-9a05-4493-8890-0de3165cfff7 col areoi-element col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-022eff8c-0571-4b9e-9d85-d21f2bc4ce7b areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Increasing visibility into the organization\u2019s network and user activity<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-31a1ceee-ca35-4386-89e1-c9017dff3d20 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Managing security risks from partners and other external users<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-35d8336b-3f31-4673-a738-82882f6a1b91 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Complying with data privacy regulations and cybersecurity requirements<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6df55816-3162-42be-bb71-d4eae92504d9 areoi-element values\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-235b85c6-daf7-4179-83b0-7d3c9ab697e1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0ed9e07a-d742-442c-898d-9f55f036ccb1 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b669322f-4829-4428-909a-e9bdca759e15 col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-left\">Syteca <mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">helps<\/mark> insurance companies to<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large d-none d-lg-block pt-5\"><img decoding=\"async\" width=\"1024\" height=\"879\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054653\/pic-2-1-1024x879.png\" alt=\"\" class=\"wp-image-37364\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054653\/pic-2-1-1024x879.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054653\/pic-2-1-300x258.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054653\/pic-2-1-768x659.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054653\/pic-2-1.png 1123w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-da7ad4f9-d796-467d-86b1-2d48500c4afe col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-63e3a4d3-3ada-44d0-bba9-ed8233733284 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-db4dd990-61b8-4abe-b030-8e5570c8708d col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054715\/Improve-network-visibility-.svg\" alt=\"\" class=\"wp-image-37371\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-a53fd812-d7ee-48d6-ad45-133b44be20ce areoi-element\">\n\t\t\t\n\t\t\t\n\n<h4 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Improve visibility across IT systems<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p class=\"mb-0\">Monitor employee activity and manage the use of USB devices in your organization\u2019s IT infrastructure.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a04b08a5-ebdf-4a4b-ad3a-49ccf72cc2ab col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054726\/Manage-privileged-access-1.svg\" alt=\"\" class=\"wp-image-37378\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-f01222df-d580-4ea1-a884-d6d23df4795b areoi-element\">\n\t\t\t\n\t\t\t\n\n<h4 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Manage privileged and third-party access&nbsp;<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p class=\"mb-0\">Ensure granular and secure access provisioning for your privileged users and third-party service providers.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-dfef54e6-e16f-4210-bf0d-6ce22bfddbcd col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054816\/Protect-third-party-access.svg\" alt=\"\" class=\"wp-image-37385\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-d0b9e523-0016-4600-8a1b-541aa8592baf areoi-element\">\n\t\t\t\n\t\t\t\n\n<h4 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Prevent sensitive data <br>theft<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p class=\"mb-0\">Oversee interactions with your organization\u2019s sensitive assets and promptly respond to data security violations.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-21f47365-5822-4d2e-8c06-d1ee5896b21d col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15054837\/Meet-compliance-requirements-1.svg\" alt=\"\" class=\"wp-image-37392\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-9d969b07-82c2-4aca-b5b0-b82a2bffe2ce areoi-element\">\n\t\t\t\n\t\t\t\n\n<h4 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Meet data protection requirements<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p class=\"mb-0\">Implement measures required by the GDPR, GLBA, and other data protection standards, laws, and regulations.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ed9bf277-4677-45b8-bff0-de2f212cbd49 areoi-element overflow-hidden\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3d7defc8-d51d-4e08-8a6c-4b22bed5719f areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-3b84cb21-56d4-47b0-8ba9-246954eab9ee areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2caa33a3-9bff-4ad6-b8d7-42fc5fbbc706 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-91c244ce-13ed-4f11-83bc-235b71858d90 col areoi-element pe-xl-0 col-12 col-xl-7\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-4 pb-xl-2 has-text-color has-link-color wp-elements-16ce790104d34ee5584ee22c085aa635\" style=\"color:#ffffff\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#10ce9e\" class=\"has-inline-color\">Protect<\/mark> your insurance assets from cyber threats<\/h2>\n\n\n\n<p class=\"mb-5 pb-xl-3 has-text-color has-link-color wp-elements-8288978a2600621651cd406fb5a3c892\" style=\"color:#ffffff\">When choosing data security solutions for insurance providers, it is vital to know what needs to be protected and from what threats. With Syteca, you can monitor and manage access to your most sensitive assets, thereby protecting them from the common threats in the insurance industry:<\/p>\n\n\n\n\t\t<div  class=\"block-b7e80e18-ed42-46f3-940d-554c46251675 areoi-element px-4 pt-4 pb-2 rounded-bg-13px accordion-dark\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-705ac533-b0e8-46ff-9ec1-d91558c12025 accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-04636aa0-0355-4728-b2bd-1401f3ee901e accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-04636aa0-0355-4728-b2bd-1401f3ee901e-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-04636aa0-0355-4728-b2bd-1401f3ee901e-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-04636aa0-0355-4728-b2bd-1401f3ee901e-collapse\"\n\t\t\t\t>\n\t\t\t\t\tCommonly targeted assets Syteca protects\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-04636aa0-0355-4728-b2bd-1401f3ee901e-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-04636aa0-0355-4728-b2bd-1401f3ee901e-header\"\n\t\t\t\tdata-bs-parent=\".block-705ac533-b0e8-46ff-9ec1-d91558c12025\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-8a2f2673-18a0-4b5e-a2ba-13a36474ba67 row areoi-element pb-3 px-3\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-65040231-2f33-44cb-8675-1fd95153d032 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4e30b70c-6b77-4184-b0d8-a113fd340570 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060811\/fi_7542221.svg\" alt=\"\" class=\"wp-image-37668\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Personal customer data<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9c977cb1-781a-409c-9e9b-0651e2156eb1 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060843\/fi_11344964.svg\" alt=\"\" class=\"wp-image-37676\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Health information<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9722380e-340c-46d3-be70-58d3af6d0671 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060905\/fi_1604644.svg\" alt=\"\" class=\"wp-image-37683\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Financial data<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-65040231-2f33-44cb-8675-1fd95153d032 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4e30b70c-6b77-4184-b0d8-a113fd340570 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060920\/fi_5274074.svg\" alt=\"\" class=\"wp-image-37690\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Privileged accounts<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6ecde3f7-894b-41e8-a8a4-7b47bfca57cd areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060934\/fi_159626-1.svg\" alt=\"\" class=\"wp-image-37697\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Cloud IT infrastructures<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-59d8b28a-4324-489f-b32f-e37ff96d553e accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-59d8b28a-4324-489f-b32f-e37ff96d553e-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-59d8b28a-4324-489f-b32f-e37ff96d553e-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-59d8b28a-4324-489f-b32f-e37ff96d553e-collapse\"\n\t\t\t\t>\n\t\t\t\t\tCommon threats Syteca helps you mitigate\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-59d8b28a-4324-489f-b32f-e37ff96d553e-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-59d8b28a-4324-489f-b32f-e37ff96d553e-header\"\n\t\t\t\tdata-bs-parent=\".block-705ac533-b0e8-46ff-9ec1-d91558c12025\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-b1a2ffc9-d07d-44f5-b548-46b0ed0c7c01 row areoi-element pb-3 px-3\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-65040231-2f33-44cb-8675-1fd95153d032 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4e30b70c-6b77-4184-b0d8-a113fd340570 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17060957\/fi_1151498.svg\" alt=\"\" class=\"wp-image-37704\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Insider threats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9c977cb1-781a-409c-9e9b-0651e2156eb1 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17061010\/fi_7542312.svg\" alt=\"\" class=\"wp-image-37711\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Human errors<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5bccd198-57f7-474b-b7c4-ae90fdd01ab5 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17061026\/fi_272289.svg\" alt=\"\" class=\"wp-image-37718\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Account compromise<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-65040231-2f33-44cb-8675-1fd95153d032 col areoi-element col-12 col-md-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4e30b70c-6b77-4184-b0d8-a113fd340570 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17061036\/fi_4453562.svg\" alt=\"\" class=\"wp-image-37725\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Third-party exploits<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32d0ed9e-e6de-437a-9ab7-b94d9ea6e236 areoi-element d-flex align-items-center py-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17061044\/fi_7349718.svg\" alt=\"\" class=\"wp-image-37732\"\/><\/figure>\n\n\n\n<p class=\"mb-0 ms-3\">Social engineering attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fb6f6a91-0e22-49b2-be81-518d87ea3f20 col areoi-element col-xl-5 d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large position-absolute bottom-0 w-100\" style=\"right:-131px;height:105%;\"><img decoding=\"async\" width=\"642\" height=\"1024\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17064016\/pic-3-1-642x1024.png\" alt=\"\" class=\"wp-image-37751\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17064016\/pic-3-1-642x1024.png 642w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17064016\/pic-3-1-188x300.png 188w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17064016\/pic-3-1-768x1225.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/17064016\/pic-3-1.png 825w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-127c0464-d8ab-49a2-ae26-70b2b2833c00 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center px-2\">A holistic cybersecurity solution for the insurance industry<\/h2>\n\n\n\n\t\t<div  class=\"block-9fb96b07-308e-48f1-b1ea-aaec8ac6a471 areoi-element container ultim-cyber\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-28352d6a-11b6-4910-aedc-5b83cdbe067c row areoi-element justify-content-center px-3 px-md-4 px-lg-0 mx-lg-5\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055230\/Property.svg\" alt=\"\" class=\"wp-image-37402\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Property and casualty insurers<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055242\/Life.svg\" alt=\"\" class=\"wp-image-37409\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Life insurance companies<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055252\/Health.svg\" alt=\"\" class=\"wp-image-37416\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Health insurers<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055304\/Cyber-insurance.svg\" alt=\"\" class=\"wp-image-37423\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Cyber insurance organizations<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4a99b95f-7441-4552-9237-7e66fe1c8bc2 row areoi-element justify-content-center px-3 px-lg-5 mx-lg-3 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">See how your employees process personally identifiable information and financial data.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Limit employee and third-party vendor access to critical assets to reduce the attack surface.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Detect and contain malicious insider activity and other human-related cybersecurity threats.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d9fe3ae9-55cd-469c-9fd1-b01c23166689 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Minimize cyber risks by ensuring compliance with security requirements.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-332b2e3b-edf0-4b31-a24c-66b948938ebb areoi-element w-100 industry\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-3 title-6 has-text-color\" style=\"color:#1a3b4e\">Industry recognition<\/h2>\n\n\n\n\t\t<div  class=\"block-0a656f97-b6ea-411c-92e3-dafd5925f4bb areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-def2aeaf-2f71-4a6b-9819-cdec6f14442b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top kuppingercole\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-22.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/www.kuppingercole.com\/research\/lc80636\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Included in 2021 Kuppingercole Leadership Compass for PAM<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3ec497ab-773e-4847-b048-4cd581495916 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bfcf909a-fd4b-4a65-ad8b-7f34123c6d5f areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top gather\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-24.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/en\/documents\/6256651\" target=\"_blank\" rel=\"noreferrer noopener\">Included in the Gartner 2025 Market Guide for Insider Risk Magement Solutions<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d03bf8d7-9a4c-4963-8eaa-debf52b8ba16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9bf20b21-401a-4740-a8ca-fed8699b1e01 areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top microsoft\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-26.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/syteca.syteca?tab=Overview\" target=\"_blank\" rel=\"noreferrer noopener\">Value Added Partner<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0fb07459-1c77-4608-83dc-5c7c385082bb col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-276fecf4-71ec-4772-bcda-0b3f141c9205 areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top nist\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/NIST_logo-1.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/www.nccoe.nist.gov\/financial-services\/privileged-account-management\" target=\"_blank\" rel=\"noreferrer noopener\">Mentioned in NIST Special Publication<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2388638f-f36e-4fe5-9e96-9f5acfd22b4d areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4 has-white-color has-text-color\">Structure your journey to an insider threat program<\/h2>\n\n\n\n\t\t<div  class=\"block-1a9e3e4b-d0b2-4df7-aac3-d755f7ff1168 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1f3cd68e-5253-44b3-a75c-1ca0382ed477 row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f25cbde5-a556-4e52-911d-39ba09f02aa5 col areoi-element align-self-sm-center align-self-md-center align-self-lg-center col-md-4\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image text-xxl-end\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" width=\"529\" height=\"717\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055334\/pic-4.png\" alt=\"\" class=\"wp-image-37431\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055334\/pic-4.png 529w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055334\/pic-4-221x300.png 221w\" sizes=\"(max-width: 529px) 100vw, 529px\" \/><\/figure>\n<\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b6523172-dfbe-4401-adbc-6eb73d6864b7 col areoi-element d-flex flex-column align-items-center align-items-md-start align-self-center align-self-md-center col-md-8\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading py-3 text-center text-md-start has-white-color has-text-color\">A Modern CISO\u2019s Guide to Running a Successful Insider Threat Program<\/h3>\n\n\n\n<p class=\"opacity-75 text-center text-md-start has-white-color has-text-color\">Get detailed guidance on how to build an effective insider risk management program and measure its effectiveness, with ready-to-use worksheets.<\/p>\n\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-1dc9b080-4b6f-4383-9eec-20ce79f24dd8 btn areoi-has-url position-relative mt-4 btn-info\"\n\t href=\"\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload White Paper \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b765ca28-0298-46f5-a74a-92f36db02e0a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-06fb4a42-09f6-4d4b-8c91-3f6c3315d70b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2fb4e6fe-cf99-4051-9872-867e239e3409 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center title-2\">How Syteca enhances cybersecurity for insurance companies<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-84a15774-cb33-47cc-8bc2-386ecc69a732 areoi-element container mitigating accordion-with-img\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4070a44b-a76e-4b29-8e8c-95cecec74245 row areoi-element with-link\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-aad32ce2-d5c9-42c5-b9c5-ca5dececb0ca col areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bc5db12d-8526-4042-b22e-12f69a2f51b3 areoi-element card\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0940ba8-c8ba-4139-99f4-6612a9064977 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-63e3f931-21c7-4e83-a982-98745dfc60cf accordion home-accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\"\n\t\t\t\t>\n\t\t\t\t\tPowerful user activity monitoring\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Enable your security officers to track employees\u2019 actions in real time and record user sessions for post-analysis. Recordings contain screenshots of user activity and extensive metadata, including visited URLs, launched applications, and typed keystrokes.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1021\" height=\"881\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring.png\" alt=\"\" class=\"wp-image-37172\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring.png 1021w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring-300x259.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring-768x663.png 768w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHigh-end identity and access management\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Securely authenticate users to prevent unauthorized access to sensitive data. Employ Syteca\u2019s two-factor authentication (2FA) and secondary authentication capabilities to verify user identities and distinguish users of shared accounts.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1018\" height=\"881\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1.png\" alt=\"\" class=\"wp-image-22885\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1.png 1018w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1-300x260.png 300w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1-768x665.png 768w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\"\n\t\t\t\t>\n\t\t\t\t\tLightweight privileged access management\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Granularly control access to critical endpoints for your privileged and regular users. Configure an access and approval workflow, set time-based access restrictions, and provide one-time passwords for external users.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"499\" height=\"456\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-2.png\" alt=\"\" class=\"wp-image-23347\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-2.png 499w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-2-300x274.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1b146619-c576-4f8f-8434-b66de843f33f accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-1b146619-c576-4f8f-8434-b66de843f33f-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\"\n\t\t\t\t>\n\t\t\t\t\tComprehensive third-party vendor monitoring\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-1b146619-c576-4f8f-8434-b66de843f33f-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Manage risks from users outside your network. Provide your partners, vendors, and third-party service providers with securely limited access to sensitive assets and monitor the activity of remote users in your IT infrastructure.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"507\" height=\"326\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1.png\" alt=\"\" class=\"wp-image-22878\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1.png 507w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1-300x193.png 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\"\n\t\t\t\t>\n\t\t\t\t\tReal-time user activity alerts and incident response\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Leverage Syteca\u2019s predefined and custom security alerts to promptly notify your security officers of suspicious user activity. Respond to threats manually or configure real-time automatic responses to certain user actions.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center top-0\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"511\" height=\"442\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1.png\" alt=\"\" class=\"wp-image-22864\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1.png 511w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1-300x259.png 300w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959-collapse\"\n\t\t\t\t>\n\t\t\t\t\tStreamlined auditing and reporting\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-075ddd44-a7fb-42b3-95ac-3dfd6f39b959-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Generate detailed reports on user activity to analyze your internal threat landscape and support your organization\u2019s security audits. Provide forensic investigators with cybersecurity evidence by exporting user session recordings in a tamper-proof format.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"491\" height=\"464\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-579-1.png\" alt=\"\" class=\"wp-image-22857\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-579-1.png 491w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-579-1-300x284.png 300w\" sizes=\"(max-width: 491px) 100vw, 491px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0d475414-1728-479e-aebf-3e43d40c7a95 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-0d475414-1728-479e-aebf-3e43d40c7a95-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-0d475414-1728-479e-aebf-3e43d40c7a95-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-0d475414-1728-479e-aebf-3e43d40c7a95-collapse\"\n\t\t\t\t>\n\t\t\t\t\tThorough anonymization of monitored user data\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-0d475414-1728-479e-aebf-3e43d40c7a95-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-0d475414-1728-479e-aebf-3e43d40c7a95-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Pseudonymize the recorded personally identifiable information of your employees and third parties to meet the requirements of data privacy regulations. You can later de-anonymize data for incident investigation.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/en\/user-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1021\" height=\"880\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1.png\" alt=\"\" class=\"wp-image-37439\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1.png 1021w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1-300x259.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15055927\/Thorough-anonymization-of-monitored-user-data-1-768x662.png 768w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14ac66f2-2166-411e-bfba-0142f88bfe43 areoi-element w-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-030b5312-944d-41eb-a56f-a48385e583e6 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ebbf50a6-b967-4131-9631-bd44317c4d43 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0d2bb77a-2a2b-4c3b-9294-15ecfe047098 col areoi-element col-lg-10 col-xl-8 offset-lg-1 offset-xl-2\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center has-white-color has-text-color\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#10ce9e\" class=\"has-inline-color\">Get more<\/mark> with enterprise-grade insider threat detection software<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-146e5f08-65ce-4fa0-b260-3613dc103002 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5a66c5e2-2926-4c16-95bb-5ae0fd440a3f row areoi-element getmore\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c9f78b33-a962-4da6-a44d-8ac917c0c815 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6598a2ce-92d9-4588-9e7d-f7c677adc08b areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#fast\">Visually structured evidence trail resulting in low incident response time<\/a><\/p>\n\n\n\n\t\t<div id=\"fast\" class=\"block-b3781fc8-b062-463f-81ea-877e90aa6a7f areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 with-link has-white-color has-text-color\">Context-rich recordings significantly reduce CERT and SOC response times. One-click search across suspicious activity makes investigations faster and more effective.<\/p>\n\n\n\n\t\t<div  class=\"block-6e5b41f1-aee6-4531-9f7c-2f62ba0e8762 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"67\" height=\"67\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-352-1.svg\" alt=\"\" class=\"wp-image-6218\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-c684bdb2-80ba-4211-a9db-3d8730589a80 areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-08228c72-9b75-45de-bf2e-bf3a88a2d53c col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33523588-11af-483a-aa29-0f23e2c4ca02 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#aIbased\">AI-based compromised account detection<\/a><\/p>\n\n\n\n\t\t<div id=\"aIbased\" class=\"block-dddf86c8-fb37-4f9c-b811-d7e2fbd5a0ca areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">Cybercriminals are constantly improving their ways of compromising privileged accounts. Powered by artificial intelligence, the Syteca UEBA module can detect a hacker who has penetrated a corporate system using stolen credentials.<\/p>\n\n\n\n\t\t<div  class=\"block-1f06f511-baef-4df1-a65f-5348c7b3b319 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"64\" height=\"72\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-353-1.svg\" alt=\"\" class=\"wp-image-6211\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-6732bcd8-81fa-4b2e-8e56-d3c55d8823bf areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1432d830-5470-49f3-9327-34f953232487 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-415175f7-9de0-44ca-bcd2-96976029d870 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#lightweight\">Lightweight software agent and highly optimized formats for storing data<\/a><\/p>\n\n\n\n\t\t<div id=\"lightweight\" class=\"block-fdfdefce-2422-4979-a951-12a17b72f271 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">The lightweight agent works silently and isn\u2019t noticeable to users or other programs. Collected data is saved in searchable and highly optimized video, audio, and text file formats for compact log storage and easy reporting.<\/p>\n\n\n\n\t\t<div  class=\"block-91f1f0f9-ec0b-4e7a-a3ba-a213d85a79ed areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"67\" height=\"63\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-2.svg\" alt=\"\" class=\"wp-image-6204\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-e0c90246-2fbc-4959-bfdd-87a404af377f areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-08620988-5445-476b-a9e8-e40b59bca055 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9bd5030e-7737-4796-83d1-88964a053a24 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#active\">Active in your environment in 20 minutes or less<\/a><\/p>\n\n\n\n\t\t<div id=\"active\" class=\"block-0751380d-741e-43d9-a4e3-553bb259bdf1 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">Syteca is quick to install and easily integrates with SIEM and ticketing systems. You\u2019ll get a ready-to-use solution right after a coffee break.<\/p>\n\n\n\n\t\t<div  class=\"block-9e24aafa-832e-4d4a-b44d-d2bd10d6d431 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"65\" height=\"65\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-354-1.svg\" alt=\"\" class=\"wp-image-6197\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-f555c280-70e5-4dca-8bf1-40cd57e27a05 areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-633b68e4-6d9b-48b6-9325-81813f7495c6 areoi-element container benefits-extended\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e1f14882-f8fe-4e84-91a0-3a6c519795e3 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e94d70a-9b5b-4bcb-a55d-838140babeb1 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Why companies choose Syteca<\/h2>\n\n\n\n\t\t<div id=\"accordion\" class=\"block-17b517dc-204f-4a94-afe0-d1dce87d1954 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-238cb4d9-5378-4d35-9a07-f3f12891b01d col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-871bbf03-1400-4ed3-ba0e-dcc6784e041b areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3c806568-bca3-4069-b68b-fe08d2f36c4b areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Full-desktop-and-server-OS-support.svg\" alt=\"\" class=\"wp-image-5064\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#prevent\">Full desktop and server OS support<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div data-bs-parent=\"#accordion\" id=\"prevent\" class=\"block-7c7f3b79-03dc-464f-9312-f98d5b53df84 areoi-element collapse show\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">Syteca continuously monitors various endpoints, including both end-user machines and servers, within any network architecture. Being one of the best user activity monitoring tools for Windows, Syteca also works for macOS and is a powerful Linux\/UNIX session audit tool. It even supports X Window System and all popular virtualization solutions. Syteca allows agent-based and jump server-based deployments as well as any combination thereof.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-27c1d5cc-534c-41ea-a2e5-02af52ea3c0a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2e33596-bfa0-4f3a-af30-25fd00903ad7 areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7044daf-0344-488e-b744-c4aa22ab7dfe areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Enterprise-ready.svg\" alt=\"\" class=\"wp-image-5072\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#manage\">Enterprise-ready<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"manage\" class=\"block-b62defd8-3e03-4622-9a5e-0597e0bd1822 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">Designed for tracking user activity on tens of thousands of endpoints, Syteca demonstrates exceptional stability and performance. As for maintenance and reliability, the platform provides high availability and multi-tenant deployment, system resource and health monitoring dashboards, and automated maintenance tasks.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3dac23ad-3ace-40fb-a6ea-e357ba3e5542 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5e3f7528-de3c-4a29-8e63-07924d9406b6 areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a70c4821-9dec-4eff-9078-a9887e844ba2 areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/More-than-user-activity-monitoring-solution.svg\" alt=\"\" class=\"wp-image-5079\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#increase\">More than user activity monitoring solution<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"increase\" class=\"block-568487a7-f395-4ed1-97ae-f39c871c7fe2 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0 with-link\">Besides tracking user activity, Syteca provides enhanced incident alerting and response functionality. But that\u2019s not all. Using Syteca Client, you can set up <a href=\"\/en\/product\/privileged-access-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">access<\/a> and <a href=\"\/en\/product\/identity-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a>. Since Syteca also provides server user activity monitoring, you always know what is happening in your network.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b79d8e7d-c1b0-4748-8f40-28319e282674 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-af8ed576-1d6b-4c28-a017-b3cd8a83658e areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fe3fb335-3959-409f-b9df-5763d543788f areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Low-total-cost-of-ownership.svg\" alt=\"\" class=\"wp-image-5087\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#comply\">Low total cost of ownership<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"comply\" class=\"block-93053b84-768c-40ff-b33c-1122e85305ee areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">The unique licensing offered by Syteca enables cost-effective deployments of any size, from small pilots to enterprise projects. Floating endpoint licensing enables license reassignment in a couple of clicks. For virtual environments, this process is automated.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9691a7ad-f541-4d7e-928b-686fd1571648 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-0\">Meet IT security requirements with Syteca\u2019s cybersecurity solutions for insurance companies<\/h2>\n\n\n\n\t\t<div  class=\"block-def2aeaf-2f71-4a6b-9819-cdec6f14442b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Global information security management standard<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">PCI DSS<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Worldwide financial security standard<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Cybersecurity for financial institutions<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">SOX<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Cybersecurity for financial institutions<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/sox-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">FISMA<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">U.S. law safeguarding government data<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">GDPR<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">EU data privacy regulation<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">NIST 800-53<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">U.S. government cybersecurity framework<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-100b9585-6bcd-4bcd-91f8-83ee7c124fd0 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-53297388-ff4c-4f32-8b9d-c28c1b4b290a areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">NIST 800-171<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Cybersecurity standard for U.S. contractors<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">NERC<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Standards for North American power systems<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">GLBA<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">U.S. law on financial data protection<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/glba-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-97024628-de44-4ad4-bb8c-e0cd1b9e0e93 areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">NISPOM Change 2 and H.R. 666<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Protecting classified information in the U.S.<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">SOC 2<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Audit standard for data security<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/soc-2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">HIPAA<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">U.S. law protecting medical data privacy<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">DORA<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">Enhancing software development practices<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-66d52d76-28da-4cd5-b6a7-e35693d2121c col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-921487fe-2815-42b4-8a6a-fb7e698e4949 areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-09caab51-ba46-4894-8701-a662de555ced areoi-element h-100 d-flex align-items-center justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 60, 79,0)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/20135303\/section2-card-img.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-poppins text-26-22 has-text-color\" style=\"color:#ffffff;font-style:normal;font-weight:600\">NIS2<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ebb98d9c-1934-4e24-9ae3-21f53e14cc4e areoi-element p-4 d-flex flex-column justify-content-between min-h-9rem\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0\">EU law for critical infrastructure cybersecurity<\/p>\n\n\n\n<p class=\"has-text-align-left btn-link mb-0\" style=\"font-style:normal;font-weight:600\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading has-text-align-center\">Recommended resources<\/h2>\n\n\n\n\t\t<div  class=\"block-b80bcebd-dce9-4755-8e38-298812a8593c areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-307057d5-1f4b-4773-81a1-d06136e7eb5b row areoi-element blog-slider resources-slider\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0c93b0d5-07e2-4946-8f1a-a4bb2eb0744b col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"\/en\/resources\/case-studies\/constitutional-court-of-korea-case-study\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070212\/Rectangle-60-4.png\" alt=\"\" class=\"wp-image-37460\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070212\/Rectangle-60-4.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070212\/Rectangle-60-4-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Case study<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1rem\"><a href=\"\/en\/resources\/case-studies\/constitutional-court-of-korea-case-study\" target=\"_blank\" rel=\"noreferrer noopener\">Government: Security Monitoring of Access to Court Records<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-34fe0355-7f4d-4396-874f-76080f9e5302 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"\/en\/resources\/case-studies\/us-based-financial-services-company\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070220\/Rectangle-60-1-1.png\" alt=\"\" class=\"wp-image-37467\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070220\/Rectangle-60-1-1.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070220\/Rectangle-60-1-1-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Case study<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1rem\"><a href=\"\/en\/resources\/case-studies\/us-based-defense-organization-case-study\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\">A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7fd3a084-ff8d-4cff-b964-2490fdd2b972 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/data-protection-compliance-insurance-industry\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070227\/Rectangle-60-2-1.png\" alt=\"\" class=\"wp-image-37474\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070227\/Rectangle-60-2-1.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070227\/Rectangle-60-2-1-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Blog post<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1rem\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/data-protection-compliance-insurance-industry\" target=\"_blank\" rel=\"noreferrer noopener\">Data Protection in Insurance: Compliance Requirements for the Insurance Companies<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-769ae13b-f9b4-458d-b6d0-91bcd2227ca9 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"\/en\/blog\/best-cyber-security-practices\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"264\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070236\/Rectangle-60-3-1.png\" alt=\"\" class=\"wp-image-37481\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070236\/Rectangle-60-3-1.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15070236\/Rectangle-60-3-1-300x190.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Blog post<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1rem\"><a href=\"\/en\/blog\/best-cyber-security-practices\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.syteca.com\/en\/blog\/best-cyber-security-practices\">12 Cybersecurity Best Practices &amp; Measures to Prevent Cyber Attacks in 2023<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ad43dc3a-b481-46ea-aa2a-6a5cafb7e144 areoi-element d-flex justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-13919476-14eb-4e3a-b302-74c156093d03 btn areoi-has-url position-relative btn-outline-secondary\"\n\t href=\"\/en\/resources\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tView All Resources \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-388f8e80-6af4-4e2d-9c42-c4b8085dbf25 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-53d66ea0-5f28-486f-9fb7-034bd2e27298 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-be9e0d5d-f83f-44e4-a971-55e81aad5d13 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f0907a22-6f59-4ddb-baec-13fcacbce846 col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\">Ready to strengthen your defenses with Syteca?<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Consult our experts on the most efficient insider risk management approach to meet your organization\u2019s cybersecurity needs.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-3e9782d7-d527-442a-8b22-fd566f3a9b41 areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-b5b7919e-b9c4-4b2b-9d56-c9b883843946 btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9bc9df52-5c3b-412f-be1f-878b9432c79b col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"<p>Recommended resources<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":22415,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-37353","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Solutions For Insurance Companies | Syteca<\/title>\n<meta name=\"description\" content=\"Leverage Syteca to secure your customers&#039; personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/industries\/insurance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Solutions For Insurance Companies | Syteca\" \/>\n<meta property=\"og:description\" content=\"Leverage Syteca to secure your customers&#039; personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/industries\/insurance\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T09:38:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance\",\"url\":\"https:\/\/www.syteca.com\/en\/industries\/insurance\",\"name\":\"Cybersecurity Solutions For Insurance Companies | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\",\"datePublished\":\"2024-01-16T13:42:36+00:00\",\"dateModified\":\"2025-08-22T09:38:09+00:00\",\"description\":\"Leverage Syteca to secure your customers' personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/industries\/insurance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage\",\"url\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\",\"contentUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/industries\/insurance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Industries\",\"item\":\"https:\/\/www.syteca.com\/en\/industries\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Solutions For Insurance Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Solutions For Insurance Companies | Syteca","description":"Leverage Syteca to secure your customers' personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/industries\/insurance","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Solutions For Insurance Companies | Syteca","og_description":"Leverage Syteca to secure your customers' personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.","og_url":"https:\/\/www.syteca.com\/en\/industries\/insurance","og_site_name":"Syteca","article_modified_time":"2025-08-22T09:38:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/industries\/insurance","url":"https:\/\/www.syteca.com\/en\/industries\/insurance","name":"Cybersecurity Solutions For Insurance Companies | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage"},"thumbnailUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg","datePublished":"2024-01-16T13:42:36+00:00","dateModified":"2025-08-22T09:38:09+00:00","description":"Leverage Syteca to secure your customers' personal data, meet cybersecurity requirements for insurance companies, and prevent insider threats.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/industries\/insurance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/industries\/insurance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/industries\/insurance#primaryimage","url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg","contentUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/industries\/insurance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Industries","item":"https:\/\/www.syteca.com\/en\/industries"},{"@type":"ListItem","position":2,"name":"Cybersecurity Solutions For Insurance Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/37353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=37353"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/37353\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/22415"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=37353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}