Insider Threat Program Development - Management Training / Consulting
Insider Threat Risk Mitigation Vendors
Does your company have a product or service that can mitigate
insider threat risks?
Please contact the NITSIG about listing your product or service
here. Pricing is very reasonable.
Insider Threat Defense, Inc.
Defense has become the "Leader-Go To Company" for Insider Threat
Program Development - Management Training™ for National Insider Threat Policy and
NISPOM Conforming Change 2.
Defense provides a broad portfolio of training and services to
potential clients that will address Insider Threat Risks with a
comprehensive and holistic approach.
Insider Threat Defense has provided
our training and services to 500+ organizations; U.S.
Government Agencies (Department of Defense, Intelligence Community),
Defense Industrial Base (DIB) contractors, NCMS Members / Chapters,
Defense Security Service, Critical Infrastructure Providers,
Aviation / Airline Industry, Spacecraft Manufacturing-Launch
Providers, Technology Companies, Banking - Financial Industry, large
and small businesses and others. (Client
Defense was one of the first companies to offer Insider Threat
Program Development - Management Training (National Insider Threat Policy / NISPOM Conforming Change 2) to the U.S. Government (DoD, IC) and DIB
contractors, helping them understand and implement Insider Threat
provides Insider Threat Program development and management
consulting services to an impressive list of clients, to include
Fortune 100 clients.
Mr. Thompson is
a licensed attorney with over 15 years of experience investigating
and prosecuting malicious employees, and managing Insider Threat
Programs (ITP's). He is widely recognized for his insider threat
expertise and unparalleled scope and breadth of experience. Mr.
Thompson has been involved with creating and managing ITP's for
numerous federal agencies. His work with the National Insider Threat
Task Force led to the creation of the National Insider Threat Policy
and ITP Minimum Standards for Executive U. S. Government Agencies.
develops and supports Internet monitoring software for
home users, business, education and government.
360 Employee Monitoring Software for the enterprise protects
your business by monitoring employee activity on their work
360 can instantly detect insider threats like data theft, employee
fraud, data breaches, and productivity loss. Track employee actions
and get real-time alerts about dangerous or inappropriate behavior.
Review individual and aggregate employee actions as if you were
sitting there with video-style screen playback.
Digital Guardian is a next generation data protection platform
purpose built to stop data theft. Digital Guardian’s unique data
awareness and endpoint visibility, combined with behavioral threat
detection and response, enables organizations to protect data
without slowing the pace of their business.
The Exabeam Security
Intelligence Platform provides organizations of all sizes with
end-to-end detection, analytics, and response capabilities from a single
security management and operations platform. Exabeam SIP includes
Exabeam Log Manager, a modern log management system, built on top of
ElasticSearch to provide unlimited data ingestion at a predictable, cost
effective price. Exabeam SIP detects complex, multi-stage threats using
the analytics capabilities of Exabeam Advanced Analytics; the world's
most deployed User and Entity Behavior Analytics (UEBA) solution.
Finally, Exabeam SIP improves incident response efficiency with Exabeam
Incident Responder, an API based security orchestration and automation
DB Networks pioneered Artificial Intelligence based database
security. DB Networks non-intrusively identifies insider threats
and database attacks. Deep protocol extraction together with
machine learning, and behavioral analysis enables customers to
gain insights into their database infrastructure. This includes
discovering all databases (including the undocumented ones),
identifying all tables being accessed, and mapping the database
accesses to specific applications. In addition, through machine
learning, database activities that deviate from the unique
models of normal behavior immediately and accurately alerts the
SOC to insider threats and database attacks.