SlideShare a Scribd company logo
1 of 13
Security from the Inside
Detect, Record, and Eliminate Malicious User Behavior
❏ 24/7 live screen recording & playback
❏ Automatically allow or block any activity
❏ Real-time user activity tracking
❏ Rule-based Risk Analysis
❏ Automated alerts
❏ Flexible and comprehensive reporting
❏ Time and productivity analysis
❏ Robust cloud or on-premise deployment
Teramind Inc
37-24 24th St. Suite 140
Long Island City, NY
11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
About Teramind
Teramind provides a user-centric security approach to monitor employee behavior. Our
software streamlines employee data collection in order to identify suspicious activity, detect
possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce
security incidents by providing real-time access to user activities by offering alerts, warnings,
redirects and user lock-outs to keep your business running as efficiently and secure as possible.
Teramind provides both cloud-based and on-premise deployment options to meet your
organization’s requirements.
Teramind Inc
37-24 24th St. Suite 140 Long
Island City, NY 11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
What problems do we solve?
Insider Threat Detection and Prevention
Teramind uses an intelligent, lightweight agent to collect and react to users’ activity in real-time. Configure Teramind to
automatically raise an alert, block an action, or lock out a user for any observable behavior. Stop emails from being sent, block
uploads to certain websites, get alerted when a user chats with a specific counterparty, and much more.
Employee Monitoring and Policy Enforcement
Use Teramind to gain collective or individual insight into user behavior. Our platform collects all PC user activity and displays all
data via intuitive, web-based dashboard with drill-down capabilities. View the user’s screen in real-time, see the content of
printed documents, analyze time spent on a certain website, and much more. Configure Teramind to enforce your company’s
security and use-policy by defining allowed and disallowed activities. Specify when to stop monitoring to protect your users’
privacy.
Session Recording
Whether for compliance or paper trail - our session recording capability is second-to-none. Teramind records a live desktop
stream which resembles a video of the session. We support standalone machines, RDS, and Citrix environments.
Privileged User Monitoring
Deploy Teramind to track and protect from remote vendors and privileged users. Allow admins to login only during permitted
hours or allow them to login only when you approve an exception request. Use Teramind to prevent administrators from
writing to certain files, installing new software, and more despite having special privileges.
Visual Screen Recording
Watch multiple users simultaneously
Take a snapshot, or export a clip to AVI
Watch historic recordings by setting a time range
Take control of users’ desktops
Teramind Inc
37-24 24th St. Suite 140 Long
Island City, NY 11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
User Activity Tracking
Incoming & outgoing e-mails
File transfer & removable media insertion
Applications running
Websites visited
Keystrokes
Chats
Search engine queries
Printed documents
Prevention and Notification
Teramind Inc
37-24 24th St. Suite 140 Long
Island City, NY 11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
Define custom actions for unwanted or high risk
behavior.
Create simple or complex rules based on anything that
Teramind monitors. For example:
If a user tries to sends an e-mail to
your@competitor.com, block the e-mail
Lock out the user when they try to copy a file from
PRIVATE to a USB drive
Limit Facebook use to 15 minutes a day, then block
Prevent remote vendors from logging in off-hours,
or launching a program unrelated to their work
Privacy Protection
Teramind understands the need to protect user
privacy and comply with local monitoring laws. Use
our tracking profile capability to bucket users into
detailed monitoring profiles.
Enable or disable any monitoring feature, based on
any criteria, for example:
By website: If the user is accessing their personal bank,
stop keystroke and screen recording.
By application: Do not capture screen nor keystrokes
when the user is in Skype.
By day and time: Monitor only during work hours.
In addition, you can ask Teramind to issue a license
key with monitoring features deliberately and
permanently disabled.
Offline Recording & Enforcement
When a computer loses connectivity for any reason,
Teramind continues to record locally until the
connection is reestablished.
Automated rules continue to be enforced based on
the last connection’s profile.
Once reconnected to the server, the agent sends
the backlog at a throttled pace, and no data loss
occurs.
Teramind Inc
37-24 24th St. Suite 140 Long
Island City, NY 11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
Productivity Analysis
See who's performing and who's not,
based on your metrics, or built-in
statistics gathered from monitoring.
Generate productivity reports for users
or departments. See what hours your
employees are most productive.
Optimize your payroll
expenditure for maximum output
Rule-Based Risk Analysis
Risk exposure snapshot of an entire
organization
Rules can be defined for any observable
activity & set to proactively block any
behavior
A reaction could be to block the action, lock
out the user, notify the administrator, or
simply warn the user and educate them to
follow your organization’s policy.
Risk levels can be assigned to each
rule and risk scores by department,
by user, or by rule level
Teramind Inc
37-24 24th St. Suite 140 Long
Island City, NY 11101
+1-212-603-9617
sales@teramind.co
www.teramind.co
Deploy Teramind Anywhere
In Your Data Center
The Teramind server is an all-inclusive Virtual
Appliance that can be deployed to your existing
VMWare, Hyper-V, or Xen environment. No
other licenses are required to run the server.
A single, adequately spec’d server can handle
above 2,000 concurrent sessions
Scale up by running multiple servers in parallel
In Your Private Cloud
Run Teramind directly in your AWS account
Leverage Amazon’s legendary scalability
and redundancy framework
On Our Hosted Solution
Get started in minutes. No server
installation nor maintenance required.
Simply install the agents and you’re
ready to go.
Leave scaling to us. The Teramind Cloud
can scale without bounds.
Technical Specifications: Server
Architecture:
Storage:
Bandwidth:
Load:
Dashboard:
Updates:
Integrations:
Self-contained, Linux-based virtual appliance that runs
on VMWare, Hyper-V, or Xen.
Approx. 1gb per 160 hours of data and screen at full-
quality and color, or 350 hours of black & white and 70%
scale
Average 10kbps upstream (agent to server), depending
on user activity level, and number of screens.
● Up to 500 concurrent users: 4 cores, 8gb
● 1000 concurrent users: 6 cores, 12gb
● 2000 concurrent users: 12 cores, 16gb
Web-based, mobile-friendly
Single file released periodically gets uploaded to
the dashboard via browser.
● Export data to your SIEM via syslog
● LDAP
● Published REST-based API
Technical Specifications: Agent
Supported
Platforms:
Sessions:
Load:
Visibility:
Deployment:
Connectivity:
● Windows 7 (32-bit / 64-bit)
● Windows 8 (32-bit / 64-bit)
● Windows 10 (32-bit / 64-bit)
● Windows Server 2008 and 2008 R2
● Windows Server 2012 and 2012 R2
● Stand-alone
● Citrix
● RDS
Approx. 30mb memory and 1-3% CPU, depending
on user activity
Hidden or revealed agents available
● Manual installation (.msi)
● Group policy
● Remote installation
● Silent install option
● Consumes an average of 10kbps upstream to
the Teramind server, based on user activity
and number of screens
● Saves data locally when disconnected

More Related Content

What's hot

PFE::Conception et développement du Back Office d'une application mobile de g...
PFE::Conception et développement du Back Office d'une application mobile de g...PFE::Conception et développement du Back Office d'une application mobile de g...
PFE::Conception et développement du Back Office d'une application mobile de g...Rami Raddaoui
 
Rapport pfe Conceptionet Developpement d'une Application web et Mobile
Rapport pfe Conceptionet Developpement d'une Application web et  Mobile Rapport pfe Conceptionet Developpement d'une Application web et  Mobile
Rapport pfe Conceptionet Developpement d'une Application web et Mobile Raoua Bennasr
 
Rapport pfe-ayoub mkharbach
Rapport pfe-ayoub mkharbachRapport pfe-ayoub mkharbach
Rapport pfe-ayoub mkharbachAyoub Mkharbach
 
Securite informatique
Securite informatiqueSecurite informatique
Securite informatiqueSouhaib El
 
Rapport projet fin d'étude
Rapport projet fin d'étudeRapport projet fin d'étude
Rapport projet fin d'étudeHibaFarhat3
 
réalisation une application web de gestion des informations météorologiques
réalisation une application web de gestion des informations météorologiquesréalisation une application web de gestion des informations météorologiques
réalisation une application web de gestion des informations météorologiquesMedk Salhi
 
Mohammed Yamani || Rapport De Stage
Mohammed Yamani || Rapport De Stage Mohammed Yamani || Rapport De Stage
Mohammed Yamani || Rapport De Stage Mohammed YAMANI
 
Presentation Zabbix en Français du 6 Juin 2013
Presentation Zabbix en Français du 6 Juin 2013Presentation Zabbix en Français du 6 Juin 2013
Presentation Zabbix en Français du 6 Juin 2013Alain Ganuchaud
 
Conception et developpement d'une application mobile Android e-location
Conception et developpement d'une application mobile Android e-locationConception et developpement d'une application mobile Android e-location
Conception et developpement d'une application mobile Android e-locationALALSYSE
 
Rapport de Projet de Fin de Parcours
Rapport de Projet de Fin de ParcoursRapport de Projet de Fin de Parcours
Rapport de Projet de Fin de ParcoursNadine hrira
 
Introduction à La Sécurité Informatique 1/2
Introduction à La Sécurité Informatique 1/2Introduction à La Sécurité Informatique 1/2
Introduction à La Sécurité Informatique 1/2Sylvain Maret
 
tutoriel sur la mise en place d'une politique de sécurité informatique
tutoriel sur la mise en place d'une politique de sécurité informatiquetutoriel sur la mise en place d'une politique de sécurité informatique
tutoriel sur la mise en place d'une politique de sécurité informatiqueManuel Cédric EBODE MBALLA
 
Mise en place d'une solution du supérvision réseau
Mise en place d'une solution du supérvision réseauMise en place d'une solution du supérvision réseau
Mise en place d'une solution du supérvision réseauRabeb Boumaiza
 
Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...Mohammed LAAZIZLI
 

What's hot (20)

Rapport de pfe (am)
Rapport de pfe (am)Rapport de pfe (am)
Rapport de pfe (am)
 
PFE::Conception et développement du Back Office d'une application mobile de g...
PFE::Conception et développement du Back Office d'une application mobile de g...PFE::Conception et développement du Back Office d'une application mobile de g...
PFE::Conception et développement du Back Office d'une application mobile de g...
 
Rapport pfe Conceptionet Developpement d'une Application web et Mobile
Rapport pfe Conceptionet Developpement d'une Application web et  Mobile Rapport pfe Conceptionet Developpement d'une Application web et  Mobile
Rapport pfe Conceptionet Developpement d'une Application web et Mobile
 
La Sécurité informatiques
La Sécurité informatiquesLa Sécurité informatiques
La Sécurité informatiques
 
Rapport pfe
Rapport pfeRapport pfe
Rapport pfe
 
Rapport pfe-ayoub mkharbach
Rapport pfe-ayoub mkharbachRapport pfe-ayoub mkharbach
Rapport pfe-ayoub mkharbach
 
Rapport PFE
Rapport PFERapport PFE
Rapport PFE
 
Securite informatique
Securite informatiqueSecurite informatique
Securite informatique
 
Rapport projet fin d'étude
Rapport projet fin d'étudeRapport projet fin d'étude
Rapport projet fin d'étude
 
Wazuh Pre.pptx
Wazuh Pre.pptxWazuh Pre.pptx
Wazuh Pre.pptx
 
réalisation une application web de gestion des informations météorologiques
réalisation une application web de gestion des informations météorologiquesréalisation une application web de gestion des informations météorologiques
réalisation une application web de gestion des informations météorologiques
 
Mohammed Yamani || Rapport De Stage
Mohammed Yamani || Rapport De Stage Mohammed Yamani || Rapport De Stage
Mohammed Yamani || Rapport De Stage
 
Presentation Zabbix en Français du 6 Juin 2013
Presentation Zabbix en Français du 6 Juin 2013Presentation Zabbix en Français du 6 Juin 2013
Presentation Zabbix en Français du 6 Juin 2013
 
Conception et developpement d'une application mobile Android e-location
Conception et developpement d'une application mobile Android e-locationConception et developpement d'une application mobile Android e-location
Conception et developpement d'une application mobile Android e-location
 
Rapport de Projet de Fin de Parcours
Rapport de Projet de Fin de ParcoursRapport de Projet de Fin de Parcours
Rapport de Projet de Fin de Parcours
 
Introduction à La Sécurité Informatique 1/2
Introduction à La Sécurité Informatique 1/2Introduction à La Sécurité Informatique 1/2
Introduction à La Sécurité Informatique 1/2
 
Modèle en cascade
Modèle en cascadeModèle en cascade
Modèle en cascade
 
tutoriel sur la mise en place d'une politique de sécurité informatique
tutoriel sur la mise en place d'une politique de sécurité informatiquetutoriel sur la mise en place d'une politique de sécurité informatique
tutoriel sur la mise en place d'une politique de sécurité informatique
 
Mise en place d'une solution du supérvision réseau
Mise en place d'une solution du supérvision réseauMise en place d'une solution du supérvision réseau
Mise en place d'une solution du supérvision réseau
 
Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...
 

Viewers also liked

C.Box Cloud Value Proposition Partnership
C.Box Cloud Value Proposition PartnershipC.Box Cloud Value Proposition Partnership
C.Box Cloud Value Proposition PartnershipAntonio Di Cecio
 
JEEVAN.KHOT_BE _MECH_ENGG
JEEVAN.KHOT_BE _MECH_ENGGJEEVAN.KHOT_BE _MECH_ENGG
JEEVAN.KHOT_BE _MECH_ENGGjeevan khot
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?BalaBit
 
IP2Speech - The Future is Here!
IP2Speech - The Future is Here!IP2Speech - The Future is Here!
IP2Speech - The Future is Here!Bryan Harrison
 
Project Planning and Management of Millau Viaduct Bridge, France
Project Planning and Management of Millau Viaduct Bridge, FranceProject Planning and Management of Millau Viaduct Bridge, France
Project Planning and Management of Millau Viaduct Bridge, FranceRakibul Hasan,MEng,EIT
 

Viewers also liked (11)

C.Box Cloud Value Proposition Partnership
C.Box Cloud Value Proposition PartnershipC.Box Cloud Value Proposition Partnership
C.Box Cloud Value Proposition Partnership
 
JEEVAN.KHOT_BE _MECH_ENGG
JEEVAN.KHOT_BE _MECH_ENGGJEEVAN.KHOT_BE _MECH_ENGG
JEEVAN.KHOT_BE _MECH_ENGG
 
MeBK 02 17
MeBK 02 17MeBK 02 17
MeBK 02 17
 
SMALL Mvule Report 2014
SMALL Mvule Report 2014SMALL Mvule Report 2014
SMALL Mvule Report 2014
 
redtacton
redtactonredtacton
redtacton
 
FINAL Talking points
FINAL Talking pointsFINAL Talking points
FINAL Talking points
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?
 
Mutualex
MutualexMutualex
Mutualex
 
IP2Speech - The Future is Here!
IP2Speech - The Future is Here!IP2Speech - The Future is Here!
IP2Speech - The Future is Here!
 
Presentazione corporate partnership
Presentazione corporate partnershipPresentazione corporate partnership
Presentazione corporate partnership
 
Project Planning and Management of Millau Viaduct Bridge, France
Project Planning and Management of Millau Viaduct Bridge, FranceProject Planning and Management of Millau Viaduct Bridge, France
Project Planning and Management of Millau Viaduct Bridge, France
 

Similar to Security from the Inside

TM - product overview
TM - product overviewTM - product overview
TM - product overviewJason Pears
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoideG Innovations
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationFamatech
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security ServicesJad Bejjani
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer Englishcynapspro GmbH
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Truong Minh Yen
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilitiesshaun_raghavan
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM DatasheetThomas Dodds
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 

Similar to Security from the Inside (20)

TM - product overview
TM - product overviewTM - product overview
TM - product overview
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimization
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
ServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - PortfolioServerAdminz - A Server Management Company - Portfolio
ServerAdminz - A Server Management Company - Portfolio
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
Jogobu
JogobuJogobu
Jogobu
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM Datasheet
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Security from the Inside

  • 1. Security from the Inside Detect, Record, and Eliminate Malicious User Behavior ❏ 24/7 live screen recording & playback ❏ Automatically allow or block any activity ❏ Real-time user activity tracking ❏ Rule-based Risk Analysis ❏ Automated alerts ❏ Flexible and comprehensive reporting ❏ Time and productivity analysis ❏ Robust cloud or on-premise deployment Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co
  • 2. About Teramind Teramind provides a user-centric security approach to monitor employee behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Teramind provides both cloud-based and on-premise deployment options to meet your organization’s requirements. Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co
  • 3. What problems do we solve? Insider Threat Detection and Prevention Teramind uses an intelligent, lightweight agent to collect and react to users’ activity in real-time. Configure Teramind to automatically raise an alert, block an action, or lock out a user for any observable behavior. Stop emails from being sent, block uploads to certain websites, get alerted when a user chats with a specific counterparty, and much more. Employee Monitoring and Policy Enforcement Use Teramind to gain collective or individual insight into user behavior. Our platform collects all PC user activity and displays all data via intuitive, web-based dashboard with drill-down capabilities. View the user’s screen in real-time, see the content of printed documents, analyze time spent on a certain website, and much more. Configure Teramind to enforce your company’s security and use-policy by defining allowed and disallowed activities. Specify when to stop monitoring to protect your users’ privacy. Session Recording Whether for compliance or paper trail - our session recording capability is second-to-none. Teramind records a live desktop stream which resembles a video of the session. We support standalone machines, RDS, and Citrix environments. Privileged User Monitoring Deploy Teramind to track and protect from remote vendors and privileged users. Allow admins to login only during permitted hours or allow them to login only when you approve an exception request. Use Teramind to prevent administrators from writing to certain files, installing new software, and more despite having special privileges.
  • 4. Visual Screen Recording Watch multiple users simultaneously Take a snapshot, or export a clip to AVI Watch historic recordings by setting a time range Take control of users’ desktops Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co
  • 5. User Activity Tracking Incoming & outgoing e-mails File transfer & removable media insertion Applications running Websites visited Keystrokes Chats Search engine queries Printed documents
  • 6. Prevention and Notification Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co Define custom actions for unwanted or high risk behavior. Create simple or complex rules based on anything that Teramind monitors. For example: If a user tries to sends an e-mail to your@competitor.com, block the e-mail Lock out the user when they try to copy a file from PRIVATE to a USB drive Limit Facebook use to 15 minutes a day, then block Prevent remote vendors from logging in off-hours, or launching a program unrelated to their work
  • 7. Privacy Protection Teramind understands the need to protect user privacy and comply with local monitoring laws. Use our tracking profile capability to bucket users into detailed monitoring profiles. Enable or disable any monitoring feature, based on any criteria, for example: By website: If the user is accessing their personal bank, stop keystroke and screen recording. By application: Do not capture screen nor keystrokes when the user is in Skype. By day and time: Monitor only during work hours. In addition, you can ask Teramind to issue a license key with monitoring features deliberately and permanently disabled.
  • 8. Offline Recording & Enforcement When a computer loses connectivity for any reason, Teramind continues to record locally until the connection is reestablished. Automated rules continue to be enforced based on the last connection’s profile. Once reconnected to the server, the agent sends the backlog at a throttled pace, and no data loss occurs. Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co
  • 9. Productivity Analysis See who's performing and who's not, based on your metrics, or built-in statistics gathered from monitoring. Generate productivity reports for users or departments. See what hours your employees are most productive. Optimize your payroll expenditure for maximum output
  • 10. Rule-Based Risk Analysis Risk exposure snapshot of an entire organization Rules can be defined for any observable activity & set to proactively block any behavior A reaction could be to block the action, lock out the user, notify the administrator, or simply warn the user and educate them to follow your organization’s policy. Risk levels can be assigned to each rule and risk scores by department, by user, or by rule level Teramind Inc 37-24 24th St. Suite 140 Long Island City, NY 11101 +1-212-603-9617 sales@teramind.co www.teramind.co
  • 11. Deploy Teramind Anywhere In Your Data Center The Teramind server is an all-inclusive Virtual Appliance that can be deployed to your existing VMWare, Hyper-V, or Xen environment. No other licenses are required to run the server. A single, adequately spec’d server can handle above 2,000 concurrent sessions Scale up by running multiple servers in parallel In Your Private Cloud Run Teramind directly in your AWS account Leverage Amazon’s legendary scalability and redundancy framework On Our Hosted Solution Get started in minutes. No server installation nor maintenance required. Simply install the agents and you’re ready to go. Leave scaling to us. The Teramind Cloud can scale without bounds.
  • 12. Technical Specifications: Server Architecture: Storage: Bandwidth: Load: Dashboard: Updates: Integrations: Self-contained, Linux-based virtual appliance that runs on VMWare, Hyper-V, or Xen. Approx. 1gb per 160 hours of data and screen at full- quality and color, or 350 hours of black & white and 70% scale Average 10kbps upstream (agent to server), depending on user activity level, and number of screens. ● Up to 500 concurrent users: 4 cores, 8gb ● 1000 concurrent users: 6 cores, 12gb ● 2000 concurrent users: 12 cores, 16gb Web-based, mobile-friendly Single file released periodically gets uploaded to the dashboard via browser. ● Export data to your SIEM via syslog ● LDAP ● Published REST-based API
  • 13. Technical Specifications: Agent Supported Platforms: Sessions: Load: Visibility: Deployment: Connectivity: ● Windows 7 (32-bit / 64-bit) ● Windows 8 (32-bit / 64-bit) ● Windows 10 (32-bit / 64-bit) ● Windows Server 2008 and 2008 R2 ● Windows Server 2012 and 2012 R2 ● Stand-alone ● Citrix ● RDS Approx. 30mb memory and 1-3% CPU, depending on user activity Hidden or revealed agents available ● Manual installation (.msi) ● Group policy ● Remote installation ● Silent install option ● Consumes an average of 10kbps upstream to the Teramind server, based on user activity and number of screens ● Saves data locally when disconnected