Protecting Sensitive Customer Data With Intelligent Session Mining
A retail company in Mexico City discovered that a competition of theirs was offering to pay one of their Store managers to sell their customer database and dealer information for competitive advantage. They suspected that other employees may have been approached by other competitors to sell information regarding their company. This led the owners to proceed with an investigation to understand whether other employees have been causing issues within the organization when it comes to information leaks.
The client’s goal was to protect customer data and proprietary information against data theft that would compromise the integrity or their company. The Mexican retailer turned to Redsploit for consultation with their employee monitoring software in order to prevent further insider threat and data breaches.
Redsploit immediately offered the retailer a trial version of the Teramind solution to monitor a select few suspected individuals, which confirmed that there were a couple of insiders who were leaking intellectual property and other sensitive data to competitors.
After seeing the incredible power of the Teramind solution and the value it brings to their organization, the IT Director along with the owners then decided to expand the scope of the users by monitoring all 300 employees immediately, including those that are working remotely and offsite. By so doing, they were able to review comprehensive historical data reports generated by the Teramind monitoring software. Redsploit delivered the IT forensics required to pinpoint both the user and the method of data exfiltration.
When data theft behavior is suspected, the key is quick detection and resolution. This is required for organizations as proof required in order to execute termination or prosecution of the offenders.
Redsploit has allowed this organization to monitor, detect, and stop further data loss moving forward. It also gave IT management the ability to use automated alerts when users do things such as; print sensitive documents, send emails to their competitors or transfer massive files from the server. IT teams are able to launch a full forensics investigation by drilling down into a user’s specific historical actions and viewing a playback of the user’s desktop when the action took place.
Since implementation, data theft from Internal Users have been eradicated thanks to the Intelligent Session Mining technology offered by Resploit, powered by Teramind.