Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.


333 West San Carlos Street
San Jose, California 95110
United States


ChannelPro Network Awards

hello 2
hello 3

Press Releases

April 17, 2018 |

Teramind Prevents Insider Threats Combining New Data Loss Prevention Features with User Behavior Analytics & Forensic Insights

Teramind (RSA Booth #5110) designs new features to address the multiple challenges industries face when combating insider threats by combining DLP, employee monitoring and forensic evidence solutions.

Teramind†Inc. (RSA booth #5110), a provider of insider threat solutions, announced a new approach to data loss prevention that will continue to help organizations from healthcare to banking, legal, energy and customer service teams and more address their internal cyber security and data breach vulnerabilities. Teramind brings organizations the latest in preventional security software after another year of global data breaches. The new software features a comprehensive platform that combines technology supporting traditional data loss prevention (DLP) software capabilities coupled with behavioral data analytics. This unique approach brings forth the next generation of forensic insight to keep companies’ data safe.

“When data is left unguarded, it’s not a matter of if a data breach will happen, but when it will happen. One of the major opportunities to lose your sensitive corporate data lies with your insiders. Behind every user’s action is the potential for monetary loss and a devalued company reputation. Insider, in security jargon, refers to anyone who has privileged access to sensitive data inside your organization: employees to vendors and even business owners themselves,” said Isaac Kohen, CEO of Teramind.

Teramind provides a user-centric security approach to monitor employee behavior, with software that streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. Teramind’s new file anti-exfiltration analysis combined with the software’s traditional DLP software capabilities and behavioral data analytics brings forth a stronger layer of protection against data breaches. File anti-exfiltration analysis targets and tags sensitive file repositories as well as sensitive content.

“Data protection is preserved throughout multiple file transformations – encryption, compression, or partial extraction – allowing the user to preserve sensitive data in all forms of data transit. Industries across verticals from business to healthcare and government now have a fighting chance to prevent insider threats as if an attempted breach occurs, the software’s full indexing and video recording allows the administrator to have concrete forensic evidence of these flagged events,” Kohen noted.

A few use cases for Teramind’s preventative approach to insider threats are below:†

  • As just one area of compliance, financial institutions have access to millions of customers’ personally identifiable information (PII) as well as self developed intellectual property. The first step in securing this sensitive data is understanding who has access to it, then monitoring those access points for changes in behavior. Teramind secures sensitive PII data against insider threats by permitting for risk-based rules to define and identify high risk behavior by users within a financial organization. Through user analytics, managers identify the data that’s most important and understand its risk. From a dashboard, one can see all their data and receive ‘alerts’ in real-time when a profiled behavior triggers it. Teramind’s full video playback and customized alerts meet PCI DSS compliance requirements.
  • ††††††††Customer service departments and contact centers deal with vast amounts of information on a daily basis. As one example scenario, a malicious criminal gains access to an upper manager’s personal Google email account. An email is sent to an employee down the ranks, and the email asks for information on a high-profile client to be downloaded from the company server and sent to the gmail account. Luckily, the file anti-exfiltration analysis functionality allowed administrators to tag this sensitive high-profile client’s data. Once the system caught that the tagged information was in movement, measures could be taken quickly to intercept.

Editor’s Choice

5 Tech Companies Aim for Channel Dominance. Read Their Powerful Pitches to MSPs.

July 9, 2024 |

Representatives of Zero Networks, Ostendio, Sectigo, Lumu Technologies, and Josys want to help you stay ahead in the IT channel. Here’s how.

ChannelPro DEFEND Conference Heads to NJ, Promises to Lift Cybersecurity and Profitability of MSPs

July 8, 2024 |

Register now for ChannelPro DEFEND: East in Islen, NJ, on Aug 7 and 8 for unparalleled cybersecurity learning, networking, and collaboration opportunities.

Related News & Articles

Growing the MSP

Explore ChannelPro


Reach Our Audience