Software snoops on social-media misbehavior
Connecting state and local government leaders
Software program looks over users' shoulders to pick up on illicit use.
The Internet can be a rough place for government organizations and large companies. Threats come from external and internal sources alike. The latest version of a security software program allows administrators to monitor user’s web access and track any potentially harmful moves they might make, and is particularly attuned to social networking.
SureView 6.5 is an endpoint information protection application designed to provide organizations with an improved ability to audit social networking activity, expand investigative capabilities and increase scalability.
The Raytheon product is engineered to support organizations’ efforts to mitigate cybersecurity risks by actively auditing user behavior for policy violations and high-risk activity. SureView records violations, compliance incidents and malicious acts that might cause an information breach and then replays them in a digital video record like format.
Company officials the application was created to meet customer requirements to more effectively manage the risks associated with multiple threats. For example, it can capture user activities such as accessing classified or proprietary data and attempting to send it outside the firewall.
However, using the tool effectively relies in part on secrecy, and organizations using SureView declined to comment about or be identified.
The latest version includes features such as: enhanced capabilities for mitigating advanced persistent threats, including new malware detection tools; new social networking auditing to monitor high level activity on the top 150 social networking websites; and the Investigator Workbench, an organization and collaboration tool that allows users to group and organize data such as video replay and notes into a virtual briefcase for sharing and export.
Raytheon claims that version 6.5 of SureView provides increased processing speed, both from the information collector to the central database, and from the central database to the investigator workbench. A new search engine enables operators to focus and define searches to specific data types. The company also says that the upgraded program allows operators to review more data in less time to quickly access incidents in seconds.
NEXT STORY: Spammers waste no time infecting Apple's Ping