Cyber Security Solution for today’s enterprise
Enterprise Security Risks
0
20
40
60
80
100
120
Sabotage
Fraud
IP Theft
[2] An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases by
Michael Hanley, Tyler Dean, Will Schroeder, Matt Houy,Randall F. Trzeciak, Joji Montelibano in
CMU Technical Note CMU/SEI-2011-TN-006
Traditional Security Solutions
Firewall/IDS
• Protects your network from external attackers
i.e. outsiders.
Data Theft Detection System
• Detects data theft by monitoring data accessed
from within the network.
Data Theft Prevention System
• Prevents unauthorized users from within the
network from stealing your data.
But data isn’t the problem
People are.
Insider Threats
 Every organization has employees.
 Employees have access to critical business information
like market strategy, financial data or even intellectual
property.
 Organizations thrive on the basis of mutual trust. But
this gets complicated as the organization grows.
 Disgruntled employees intentionally try to harm the
company.
 A cyber crime is relatively tough to trace and allows the
insider to execute it rather anonymously.
Introducing: Satark
 Satark, meaning, “Alert” in Sanskrit, is a system that
helps you detect insider threats BEFORE they can
execute an attack.
 Which means you can catch a data theft before the data
is actually stolen!
Satark correlates
Data
Access
User
Activity
Monitoring
And gives you
Potentially
Risky
People
Employee
Suspects
Good
Employees
All done anonymously
With compliance to data protection acts of your region
Thank you
Kaushal@Pratikar.com

Satark