hero image

Insider Threats

Control the Threat from Within.

Can You Trust Your Employees and Business Partners?

With data breaches increasing each year, companies are investing in top-of-the-line security solutions to prevent hackers and outside attacks from gaining access to their networks. But what about the risk of an attack originating from within the company? Every industry is potentially vulnerable to these types of attacks from both employees and trusted third parties.

 

The Inside Threat

Identifying which employee, business associate or trusted third party can pose a threat can be extremely challenging when the risk can come from anyone: a current or former employee, contractor or business partner with access to the system, network or data. Disgruntled employees might seek revenge on the company that they perceived to have wronged them, or an undervalued worker might feel a sense of entitlement and sabotage the company.

 

With many ways to extract data or create backdoors into the systems, nothing is safe. An insider may have the ability to impact the confidentiality, integrity or availability of the company’s systems, networks or data. Solutions designed solely to prevent outside attacks cannot combat the risks coming from within the organization.

Network Control and Management

Untangle helps network administrators to manage user privilege and automate control of the network. With Policy Manager, users and departments can be segregated into different groups with specific access to websites, applications and cloud services made visible via clear, concise reporting. With Web Filter and Application Control, the administrator can identify applications that could pose an exfiltration threat to the data on the network. For example, if an employee is known to have attempted to transfer files or share files, the administrator can block or flag Dropbox or file sharing applications.

Reporting is Key

The Untangle Reports application brings all the tracking and monitoring of events, users, and traffic on the network together into fully dynamic, interactive reports––with drill-down capabilities into specific users’ details and events, including web page visits, downloads, blocked pages, attempted access to files, and more. Administrators can set up custom, conditional alerts to be notified when an unwanted action occurs. It’s easy to create any type of report or use one of the 250 default reports to get visibility into and control over all activity on the network.

Put Untangle on Your Team

There is no single solution to the problem of insider threats. Complex issues require a multifaceted approach, including defining Acceptable Use Policies and monitoring their enforcement. Data security and network security must go hand-in-hand with employee education.

 

Untangle NG Firewall is your MVP for network monitoring and reporting, giving you insight into all of your traffic. With a simple user interface and affordable price point, NG Firewall can help your organization maintain its security both on the inside and outside of the network. Get started today with the Complete Package––the most comprehensive solution and best value for your organization.

Whitepaper Download

This whitepaper helps you to identify insider threats and protect your organization’s data.

Contact Us

Contact us to find out how Untangle can help control insider threats in your industry.