Bottomline Internal Threat ManagementBottomline
|
Risk MonitorSearchInform
|
|||||
Related Products
|
||||||
About
No agent is put on employee devices. Data is pulled directly from the network into our application. So, whether your organization is remote, hybrid, or bring-your-own-device, you'll have the flexibility to monitor employee actions no matter how your organization is structured. Speed up investigations by identifying unusual behavior or risks using data enriched by machine learning, analytics, and years of experience protecting some of the largest corporations and financial institutions in the world. Whether an internal threat is malicious or intentional, the details matter! Visually map connections between unusual activities and users, expediting the detection of insider activity, including external fraud initiated from within. Identify unusual behavior or risks using data enriched by machine learning, analytics, and years of experience protecting some of the largest corporations and financial institutions in the world.
|
About
SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools.
Provides your business with multifaceted protection against financial losses caused by internal threats in several stages:
•Detecting incidents involving corporate fraud and profiteering
•Controlling the human factor and predicting HR risks
•Protecting confidential data from leaks during its storage, use and transfer
•Facilitating regulatory compliance and investigation processes
The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations in search of a tool to gain end-to-end visibility of any internal threats
|
Audience
Companies from various business spheres and G-sector clients of different size and structure
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationBottomline
United States
www.bottomline.com/risk-solutions/internal-threat-management
|
Company InformationSearchInform
Founded: 1995
searchinform.com/products/srm/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Employee Monitoring Features
Activity Monitoring
Browsing History
Email Monitoring
Keystroke Recording
Productivity Analysis
Remote Control
Screen Activity Recording
Time & Attendance
Time Tracking
Risk Management Features
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
|
||||||
Integrations
SearchInform SIEM
|
||||||
|
|
|