Privileged IT users pose one of the greatest dangers to the organization. With their higher authorizations to access corporate systems and sensitive data, and their use of system and database that are not subject to internal auditing, they can reach the most critical information and use it to their own ends.
Recent surveys show that approximately two-thirds of fraud and identity-theft cases are perpetrated by company employees, including privileged users. The 2012 report of the Association of Certified Fraud Examiners estimates that companies worldwide lose, on average, 5% of their annual revenues to internal fraud. In response, organizations around the world are placing a greater focus on finding solutions to safeguard against insider threat that go beyond perimeter protection
Intellinx presents a first-of-its-kind, cross-platform surveillance system for unparalleled visibility of privileged IT users in corporate applications across the enterprise. The Intellinx system provides record, replay and search functions of user activity, and proactive detection of suspicious activity, behavior profiling and real-time analytics.
Intellinx can monitor privileged users in different environments:
Intellinx provides complete visibility into end-user activity with visual replay of every screen, and keystroke in every application across all major platforms. It enables security and fraud officers to know who did what, when and where. The activity of all internal and external end-users is recorded, regular users as well as privileged IT users.
Intellinx captures a very detailed field-level audit trail of user activity, with extensive cross-platform search capabilities for user activities. It allows you to search, for example, for all users who accessed an account number during a specific timeframe in any application; then visually replay a certain user’s actions. Investigation can be performed in real-time or post-event.
Intellinx generates real-time alerts that enable instant detection of suspicious behavior and timely response to mitigate damage. Configurable rules track user behavior patterns at the application level and generate alerts on irregularities in real-time.
Intellinx allows you to perform after-the-fact analysis of user behavior by applying new rules to pre-recorded data. Thus, new fraud detection knowledge can be applied to the organization’s pre-recorded information in order to predict and prevent future crimes.
Immediately following the rapid installation, Intellinx begins capturing all cross-enterprise user activity. Organizations begin benefiting from Intellinx without delay, with no need for time-consuming integration with any of the organization’s systems or application-related configurations.