Uba PDF
Uba PDF
Uba PDF
ARCON
User Behavior Analytics
www.arconnet.com
What is UBA ?
Predict | Protect | Prevent
www.arconnet.com | 2
Why UBA ?
Predict | Protect | Prevent
www.arconnet.com | 3
Key Features Predict | Protect | Prevent
Session Monitoring
Enables recording of all activities performed by an end-user on the desktop along with a screen capture through a
web-based engine that stores and analyzes user behavior profiles.
User Restriction
This feature is useful for restricting any specific activity (apparently irrelevant) for any particular user.
Privilege Elevation
Mitigates data breach risk by discarding large number of ADMIN (privileged) users. This tool provides flexibility to
enterprises with on-request admin rights that allows end-users to access critical applications for a defined period
after a valid approval.
www.arconnet.com | 4
Key Features Predict | Protect | Prevent
Productivity Enhancements
Centralized monitoring framework facilitates standard machine configuration policy that allows enterprise to
guard against any anomalies in end–user behavior profiles. This enables to boost overall productivity as it helps to
generate performance reviews on non-technical observables such as security violations and fraudulent events
caused by disgruntled end-user.
Meeting Compliance
ARCON User Behavior Analytics empowers enterprise to meet various compliance requirements by offering real-
time threat alerts such as misuse of trusted privileges or other Admin accounts whilst offering granular access
control mechanism. A host of regulatory requirements PCI-DSS, SOX, NIST, GDPR are fulfilled.
Behavior Analytics
The tool enables to design an enterprise security framework. Machines are configured as per the policy and
applied to all end-users. The centralized framework thus helps organizations to identify user behavior by
comparing against the configured baseline activities.
www.arconnet.com | 5
Key Features
Predict | Protect | Prevent
User Behavior Analytics provides a continuous monitoring framework to mitigate insider threats and suspicious
activities across the enterprise. The tool built upon technical and non-technical analytic methodologies automates
the entire risk- assessment process by acting as a floodgate to block unusual and suspected activities.
Dynamic Report
The tool’s programmatic approach to strengthen security and compliance framework through dynamic
report allows management to keep a real-time track on technical observables such as unusual working hours,
misuse of Privilege Access, anomalous network service usage, printing activity and so forth.
Live Dashboard
Investigating abnormal incidents and timely response to threats simplified as the all-encompassing reporting
mechanism raises immediate alerts on Live Dashboards. This feature is beneficial to keep control over operations,
governance and compliance requirements.
www.arconnet.com | 6
Component Description
Predict | Protect | Prevent
Database
• Configuration data and user logs are stored in a
database.
Technology used
• Windows Web Server 2012 and above
• MSSQL Server 2012+
www.arconnet.com | 7
Use Cases Predict | Protect | Prevent
www.arconnet.com | 8
Predict | Protect | Prevent
Thank You!!!
www.arconnet.com