Does your company have a product or service that can mitigate
insider threat risks?
Please contact the NITSIG about listing your product or service
here. Pricing is very reasonable.
Insider Threat Defense, Inc.
Defense has become the "Leader-Go To Company" for Insider Threat
Program Development Training™ for National Insider Threat Policy and NISPOM Conforming Change 2.
Defense provides a broad portfolio of training and services to
potential clients that will address Insider Threat Risks with a
comprehensive and holistic approach.
Insider Threat Defense has provided
our training and services to 500+ organizations; U.S.
Government Agencies (Department of Defense, Intelligence Community),
Defense Industrial Base (DIB) contractors, NCMS Members / Chapters,
Defense Security Service, Critical Infrastructure Providers,
Aviation / Airline Industry, Spacecraft Manufacturing-Launch
Providers, Technology Companies, Banking - Financial Industry, large
and small businesses and others. (Client
Defense was one of the first companies to offer Insider Threat
Program Development Training (National Insider Threat Policy /
NISPOM Conforming Change 2) to the U.S. Government (DoD, IC) and DIB
contractors, helping them understand and implement Insider Threat
Tanager is a leading
small business in insider threat program implementation for the U.S.
Government. While many may talk about insider threat in general
terms and as a conceptual problem;
implemented, operated, and performed Counterintelligence focused
analysis and Insider Threat solutions implementation on several U.S.
Government insider threat programs since 2010.
The Tanager team has been active in insider threat programs since
2010, with experience implementing insider threat capabilities and
solutions in over 20 U.S. Government and commercial environments. Tanager's Insider Threat Mitigation Services provide a flexible
turn-key technical and programmatic solution, utilizing the leading
host-based insider threat audit and monitoring tools available. This
managed service offering provides a quick and easy way for industry
to leverage "U.S. government-grade" host-based audit and monitoring
capabilities using a partner who has extensive hands-on experience.
Tanager offers a full
range of insider threat mission services including, training, and
insider threat program implementation services.
develops and supports Internet monitoring software for
home users, business, education and government.
360 Employee Monitoring Software for the enterprise protects
your business by monitoring employee activity on their work
360 can instantly detect insider threats like data theft, employee
fraud, data breaches, and productivity loss. Track employee actions
and get real-time alerts about dangerous or inappropriate behavior.
Review individual and aggregate employee actions as if you were
sitting there with video-style screen playback.
Digital Guardian is a next generation data protection platform
purpose built to stop data theft. Digital Guardian’s unique data
awareness and endpoint visibility, combined with behavioral threat
detection and response, enables organizations to protect data
without slowing the pace of their business.
The Exabeam Security
Intelligence Platform provides organizations of all sizes with
end-to-end detection, analytics, and response capabilities from a single
security management and operations platform. Exabeam SIP includes
Exabeam Log Manager, a modern log management system, built on top of
ElasticSearch to provide unlimited data ingestion at a predictable, cost
effective price. Exabeam SIP detects complex, multi-stage threats using
the analytics capabilities of Exabeam Advanced Analytics; the world's
most deployed User and Entity Behavior Analytics (UEBA) solution.
Finally, Exabeam SIP improves incident response efficiency with Exabeam
Incident Responder, an API based security orchestration and automation
DB Networks pioneered Artificial Intelligence based database
security. DB Networks non-intrusively identifies insider threats
and database attacks. Deep protocol extraction together with
machine learning, and behavioral analysis enables customers to
gain insights into their database infrastructure. This includes
discovering all databases (including the undocumented ones),
identifying all tables being accessed, and mapping the database
accesses to specific applications. In addition, through machine
learning, database activities that deviate from the unique
models of normal behavior immediately and accurately alerts the
SOC to insider threats and database attacks.