Even as the IT threat landscape continues to evolve at an alarming rate, Gartner predicts that the market for UBA will grow steeply in the years to come. This growth can be attributed to a UBA solution’s insider threat and compromised account detection features, which are found wanting in existing security solutions.
If you’re not familiar with UBA already, it’s about time you got acquainted.
Become alerted in real time via email and SMS of critical activities, such as when a user is added to a privileged group. Define thresholds based on time, volume, and other criteria to spot suspicious activities like mass file access. Execute scripts to automate response actions, like disabling a user account.
Track all logons spanning from logon failures to logon history across your domain controllers, Windows servers, and workstations. Monitor the actual time spent by employees at their workstations with details on when they were idle and active. Audit remote desktop connections and remote logons occurring via RDG and RADIUS NPS servers.
© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.