Prevent users from turning hostile User Threat Quotient Security intelligence to spot risky users at a glance Today s network attacks center on the user, making users the weakest link in the security chain. Statistics reveal that 80% of security risks are caused by network users. A network generates huge amount of data. This data contains enough cues to offer patterns of human behavior that can be used to predict and prevent attacks. However, comprehending and corelating data out of various logs and reports to get meaningful information requires time and skills. Besides, it carries the risk of human oversight. Organizations need a security model to harness this information and start interpreting network traf c as user-generated traf c comprising of intentional and unintentional acts. The User Threat Quotient (UTQ) harnesses information derived out of network traf c and offers patterns of user behavior to determine risky users in a network. UTQ is available on Cyberoam s Next-Generation Firewall and UTM appliances. Spot Risky Users at a glance with the User Threat Quotient User Threat Quotient (UTQ) is a score assigned to each network user which provides actionable intelligence to IT security managers on risky users and their network activities that pose a risk to the network. IT security managers can further investigate the cause and take appropriate actions like ne-tuning security policies and controls, imparting security awareness training, warning, cleaning the infected machine, and more to stop or remediate security attacks. The UTQ graph showing users who pose High risk, Medium risk, Low risk In its current phase, Cyberoam s User Threat Quotient (UTQ) studies the web behavior of users by analyzing massive data of allowed and denied web traf c for web categories like IP Address, P2P, Phishing and Fraud, Porn, SPAM URL, Spyware, URL Translation Sites and more that pose security and legal risks. The UTQ graph offers details on web behavior of users to the IT security managers. A simple click on a bubble, which represents a user, provides information on websites visited, number of attempts, and website categories all of which contributes to a user s Threat Quotient. Here are a few examples of a user s web behavior that leads to a high User Threat Quotient : The user unknowingly visits a malware-infected website, which infects the user s machine The user is led in to visiting a Phishing or fraud website or a Spam URL The user visits IP addresses instead of a URL The user visits a P2P website or URL translation site to conceal activities or bypass the rewall The user visits a gambling website/adult website, which poses a legal or compliance risk to the organization The User Threat Quotient helps CSOs / IT security managers by: Spotting risky users at a glance without manual efforts to co-relate network logs and reports Eliminating the risk of error and oversight while dealing with huge amount of data contained in network logs and reports Removing complexity in analyzing terabytes of logs to identify user behavior by making actionable security intelligence readily available Facilitating corrective actions by ne-tuning user policies and managing risks arising from privileged users Eliminating the need for SMBs to invest in separate SIEM tools to spot risky users Enabling investigation into the spread of risk within the network with useful insights into network activities of risky users Allowing administrators to identify and educate users who pose security risks VPNC Toll Free Numbers CERTIFIED SSL Portal SSL Exchange USA : +1-800-686-2360 | India : 1-800-301-00013 VPNC CERTIFIED Basic APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 www.cyberoam.com | sales@cyberoam.com Interop AES www.check-mark.com Interop SSL Firefox SSL JavaScript SSL Basic Network Extension SSL Advanced Network Extension Copyright © 1999-2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved
© Copyright 2024