Protecting Sensitive Customer Data With Intelligent Session Mining


The Challenge

A retail company in Mexico City discovered that a competition of theirs was offering to pay one of their Store managers to sell their customer database and dealer information for competitive advantage. They suspected that other employees may have been approached by other competitors to sell information regarding their company. This led the owners to proceed with an investigation to understand whether other employees have been causing issues within the organization when it comes to information leaks. 

The Solution

The client’s goal was to protect customer data and proprietary information against data theft that would compromise the integrity or their company. The Mexican retailer turned to Redsploit for consultation with their employee monitoring software in order to prevent further insider threat and data breaches.

Redsploit immediately offered the retailer a trial version of the Teramind solution to monitor a select few suspected individuals, which confirmed that there were a couple of insiders who were leaking intellectual property and other sensitive data to competitors.

After seeing the incredible power of the Teramind solution and the value it brings to their organization, the IT Director along with the owners then decided to expand the scope of the users by monitoring all 300 employees immediately, including those that are working remotely and offsite.  By so doing, they were able to review comprehensive historical data reports generated by the Teramind monitoring software. Redsploit delivered the IT forensics required to pinpoint both the user and the method of data exfiltration.

The Result

When data theft behavior is suspected, the key is quick detection and resolution. This is required for organizations as proof required in order to execute termination or prosecution of the offenders.

Redsploit has allowed this organization to monitor, detect, and stop further data loss moving forward. It also gave IT management the ability to use automated alerts when users do things such as; print sensitive documents, send emails to their competitors or transfer massive files from the server. IT teams are able to launch a full forensics investigation by drilling down into a user’s specific historical actions and viewing a playback of the user’s desktop when the action took place.

Since implementation, data theft from Internal Users have been eradicated thanks to the Intelligent Session Mining technology offered by Resploit, powered by Teramind.

Mexico City Retailer
January 11, 2018
User Activity Monitoring Solution
Our Role
IT Consulting & Strategy

000-017   000-080   000-089   000-104   000-105   000-106   070-461   100-101   100-105  , 100-105  , 101   101-400   102-400   1V0-601   1Y0-201   1Z0-051   1Z0-060   1Z0-061   1Z0-144   1z0-434   1Z0-803   1Z0-804   1z0-808   200-101   200-120   200-125  , 200-125  , 200-310   200-355   210-060   210-065   210-260   220-801   220-802   220-901   220-902   2V0-620   2V0-621   2V0-621D   300-070   300-075   300-101   300-115   300-135   3002   300-206   300-208   300-209   300-320   350-001   350-018   350-029   350-030   350-050   350-060   350-080   352-001   400-051   400-101   400-201   500-260   640-692   640-911   640-916   642-732   642-999   700-501   70-177   70-178   70-243   70-246   70-270   70-346   70-347   70-410   70-411   70-412   70-413   70-417   70-461   70-462   70-463   70-480   70-483   70-486   70-487   70-488   70-532   70-533   70-534   70-980   74-678   810-403   9A0-385   9L0-012   9L0-066   ADM-201   AWS-SYSOPS   C_TFIN52_66   c2010-652   c2010-657   CAP   CAS-002   CCA-500   CISM   CISSP   CRISC   EX200   EX300   HP0-S42   ICBB   ICGB   ITILFND   JK0-022   JN0-102   JN0-360   LX0-103   LX0-104   M70-101   MB2-704   MB2-707   MB5-705   MB6-703   N10-006   NS0-157   NSE4   OG0-091   OG0-093   PEGACPBA71V1   PMP   PR000041   SSCP   SY0-401   VCP550