Pune, India – May 12, 2016: ProactEye Cloud Access Security Broker is proudly ready with better cyber space security, along with bigger worries for cyber criminals. Raising the stakes, ProactEye Cloud Access Security Broker has released its Version 2.0 which is stronger and with additional tools to make your cyber security better than ever.
The enhanced features include enhanced Security Monitoring Dashboard to identity Risks and Threats, along with Security Policies Enhancement with RISK Adaption. New features include Privileged Identity Management (PIM) addition in the Activity Monitoring. It also features Support for Amazon ADMIN Logs, along with Risk notifications.
In Version 2.0, Proacteye Cloud Access Security Broker has launched integrated Privileged Identity Management (PIM) with Activity Monitoring functionality. This integration protects the applications against Insider Threats and Data Theft. With this launch Proacteye has become the only proud vendor to offer integrated solution to shield, manage, log and monitor all privileged accounts. PIM caters to all special requirements of powerful accounts within the IT infrastructure of an enterprise.
Proacteye Cloud Access Security Broker has enhanced security monitoring dashboard. This dashboard has been designed to enable both security and fraud teams to visualize and analyze millions of user web sessions. Visualization and analysis help to identify cybercrime threats, business logic abuse, fraudulent activities and privileged account monitoring in real time. New dashboard has been engineered to enable organizations to isolate cyber-criminal activity from legitimate online customers quickly.
Proacteye Security Policy with Adaptive risks is a foolproof fraud detection platform. It leverages risk-based, multi-factor authentication to protect users accessing websites, online portals, mobile browsers and mobile applications.
Adaptive risk module can analyze multiple risk indicators and identify suspicious user activity if any. Using a dynamic risk and rules-based approach, Adaptive risk policies can initiate requests for additional identity verification through a variety of methods, such as geographical location and time base login policies, for sessions that are high-risk and violate a policy.
ProactEye Cloud Access Security Broker now supports Amazon Web Services (AWS) logs. This module can be used to view CloudTrail events by region.
AWS CloudTrail is a web service that records AWS API calls for user account and delivers log files to the user.
Users can also filter out irrelevant events and quickly list the events they are interested in. ProactEye AWS module helps to combine log files from CloudTrail with the operating system of users’ devices or application logs. Once these events are ingested, ProactEye Cloud Access Security Broker enables users to perform quick searches on vast amounts of data, correlate events from multiple sources and create the dashboards on the data, as per the requirements of the users.
To know more about ProactEye Cloud Access Security Broker, visit our website http://proacteye.com/
ProactEye Cloud Access Security Broker is the Security Behavioural Analytics Platform. It detects & prevents fraud, data leaks and advanced inner as well as outer attacks and Big Data.
Monday – Friday
8 AM – 6 PM CT (UTC–6)