How to detect malicious incidents that can lead to data breaches?

Traditional security alert and incident investigation tools are not designed for the SaaS- Mobile environment. Furthermore, alerts typically consist of obscure data in raw log files that resist full understanding, even for experienced security analysts. An incident investigation itself demands scripting, manual correlation of various log files, interpreting meaning, manually removing secondary data sources for clues, and spending considerable time trying to determine the root cause of an alert incident. To glean deeper insights, incident correlation needs to be backed by advanced machine learning.

CipherCloud’s Insights Investigate functionality provides:

A rich set of tools for incident management enabling administrators to view, correlate, and investigate incidents that involve policy violations, assign a level of severity to an incident, and specify the appropriate action. In addition, administrators can view information about incidents and their sources from several perspectives, and obtain additional details about each incident or source.

Feature Highlights

Incident Insights presents a graphical view of count of incidents by type of violation, including login, DLP, DRM, and external sharing violations, malware, geo anomalies, device classification and location anomalies.

Entity Insights presents a graphical view of the count of incidents by their source, including user, device, location, application, content, and external user.

Assess Threats and Manage Incidents in the Cloud

How do you correlate similar incidents to connect the dots between "unrelated" activities?

Backed by advanced machine learning, information from user beahviorial analytics is fed into Insights Investigate. The analytics engine is used to monitor several vectors, including user accounts; servers; network devices, non-trusted communication sources, insecure protocols, and other signs of malicious behavior; and to detect protection disablement or removal, or status of threat updates:

Feature Highlights

Detects when a user (privileged or not) is performing risky activities that are outside of their normal baseline and updates the incident.

Enforces behavioral analysis of the incident to connect the dots between “unrelated” activities and ends these attacks before loss occurs.

Featured Article

Detect and Track Threats Through UEBA and Insights Investigate

How do you ensure incident governance?

Incident Management lists all the policy violated incidents occurring in the organization, and the administrator can filter the list based on time period (day, date, hour), cloud (managed or unmanaged), severity (low, medium, high) or status (open, under investigation, resolved).

Feature Highlights

Enable security analysts to drill down to the most granular detail of an incident to create best practices for compliance to industry regulations

Glean deeper understanding into the root caue of incidents by narrowing down investigations by writing queries.


How to prevent data breaches and ransomware?

Questions? We'll put you on the right path.

Ask about CipherCloud products, pricing, implementation, or anything else. Our knowledgeable reps are standing by, ready to help.

OR CALL 1-855-524-7437