2. Enterprise Security Risks
0
20
40
60
80
100
120
Sabotage
Fraud
IP Theft
[2] An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases by
Michael Hanley, Tyler Dean, Will Schroeder, Matt Houy,Randall F. Trzeciak, Joji Montelibano in
CMU Technical Note CMU/SEI-2011-TN-006
3. Traditional Security Solutions
Firewall/IDS
• Protects your network from external attackers
i.e. outsiders.
Data Theft Detection System
• Detects data theft by monitoring data accessed
from within the network.
Data Theft Prevention System
• Prevents unauthorized users from within the
network from stealing your data.
5. Insider Threats
Every organization has employees.
Employees have access to critical business information
like market strategy, financial data or even intellectual
property.
Organizations thrive on the basis of mutual trust. But
this gets complicated as the organization grows.
Disgruntled employees intentionally try to harm the
company.
A cyber crime is relatively tough to trace and allows the
insider to execute it rather anonymously.
6. Introducing: Satark
Satark, meaning, “Alert” in Sanskrit, is a system that
helps you detect insider threats BEFORE they can
execute an attack.
Which means you can catch a data theft before the data
is actually stolen!