На информационном ресурсе применяются рекомендательные технологии (информационные технологии предоставления информации на основе сбора, систематизации и анализа сведений, относящихся к предпочтениям пользователей сети "Интернет", находящихся на территории Российской Федерации)

Feedbox

15 подписчиков

Forcepoint Puts Humans At The Center Of Security

Author: Justin Warren / Source: Forbes

How do you monitor the behavior of the humans in your organization without seeming creepy? That’s the challenge Forcepoint has set itself as it integrates the User Entity Behavior Analytics features of its RedOwl acquisition into its product portfolio.

Detecting when people put an organisation at risk—conducting industrial espionage on behalf of a competitor, or just inserting a USB stick full of malware into their work laptop—is something few would object to.

But the process of monitoring people going about their daily work in order to do that detection can stray across a ‘creepy’ line without careful planning. Different cultures and areas of the world have different expectations about where this line should be drawn.

The way Forcepoint approaches things is to build in the greatest individual privacy protections it can, in order to support those jurisdictions—such as the EU—where privacy controls are strictest. Individual companies can then choose to use these robust privacy protections, or not.

Lauren Webster, Senior Director of Product Management at Forcepoint
Lauren Webster, Senior Director of Product Management at Forcepoint

“We’re attempting to balance that need to have deep insights into various datastreams in order to make sense of what’s going on, while also protecting employee privacy,” said Lauren Webster, Senior Director of Product Management at Forcepoint. Getting this right means looking at more than just what technology is capable of.

“We’ve worked really closely with customers,” says Webster. “The technology has really been informed by programmatic considerations that surround the technology at each customer.”

Take the case of masking. The actions of employees captured by the Forcepoint system are masked so that they are pseudonymous; you can’t easily tell just by looking at the system who is performing the actions.

This way the focus is on unexpected behavior irrespective of the individual involved. If someone normally only logs into…

Click here to read more

The post Forcepoint Puts Humans At The Center Of Security appeared first on FeedBox.

Ссылка на первоисточник
наверх