Our website uses cookies. To find out more information on the cookies we use, please head to our privacy policy.OK

Privileged Behaviour Management

Generally, the PxM Platform’s Privileged Behaviour Management (PBM) module brings a depth of features to any IT infrastructure. Most noteworthy of these is predicting suspicious behaviour by privileged users.

Primarily, the PBM module creates a series of base lines against which user actions are measured. With PBM, a user’s posture is about when and where they complete tasks and interactive sessions. In addition, PBM learns each privileged user “baseline” along with their peers. Because of this, if a user does roughly the same as their peers, their risk profile reduces.

User profiles are created by the PxM Platform and define which tools and tasks users can access on which systems or devices. Therefore, a  user that starts to do something that seems out of the ordinary gains a higher threat profile based on their unusual behaviour.

Main Features

Threat Detection Icon

Our statistics create a series of behavioural baselines for all privileged users that is automatically categorised. Through the PxM Platform’s use of profiles, other users are treated as behavioural peers. Owing to this, we can pre-emptively flag users who's behaviour seems like it's abnormal or suspicious.

Real time Monitoring Icon

Monitor user activities when and where they happen with our fully integrated metrics and reporting system. Furthermore, you can visualise correlations in user tendencies in real-time and also automatically produce data sets in a variety of user-friendly formats.

Identify Latent Threat

Privilege creep can rise when users gain privileges in excess of their requirements. Now you can identify and prevent this latent threat by supplying and withholding privileges. Access is only given to users access when they need it.

Additional Features

Intelligently Assigned Risk Scores

All privileged users gain risk scores reflecting behavioural baselines. SysAdmins can then use these scores to address security risks.
As a result, you can remove any doubt surrounding access rights.

Use Past Data to Manage Future Risk

Compare privileged user data. Preemptively display clear cases of exposed risks to infrastructure and give users privileges that fit their requirements - never under-privilege, never over-privilege. Baselines constantly adapt and update to mirror privileged use patterns.

Adaptive threat profile based on address

The PxM Platform creates a profile for each privileged user in your organisation. Due to this, you can observe whenever a user’s access address differs from the existing baselines. If a user logs in more frequently from a given address, the lower their suspicion becomes.

Datasheet for PBM

Gain access to our PBM datasheet

Download the PBM module datasheet for a full technical breakdown, including a full feature list.