Privileged Behaviour Management
Generally, the PxM Platform’s Privileged Behaviour Management (PBM) module brings a depth of features to any IT infrastructure. Most noteworthy of these is predicting suspicious behaviour by privileged users.
Primarily, the PBM module creates a series of base lines against which user actions are measured. With PBM, a user’s posture is about when and where they complete tasks and interactive sessions. In addition, PBM learns each privileged user “baseline” along with their peers. Because of this, if a user does roughly the same as their peers, their risk profile reduces.
User profiles are created by the PxM Platform and define which tools and tasks users can access on which systems or devices. Therefore, a user that starts to do something that seems out of the ordinary gains a higher threat profile based on their unusual behaviour.
Our statistics create a series of behavioural baselines for all privileged users that is automatically categorised. Through the PxM Platform’s use of profiles, other users are treated as behavioural peers. Owing to this, we can pre-emptively flag users who's behaviour seems like it's abnormal or suspicious.
Monitor user activities when and where they happen with our fully integrated metrics and reporting system. Furthermore, you can visualise correlations in user tendencies in real-time and also automatically produce data sets in a variety of user-friendly formats.
Privilege creep can rise when users gain privileges in excess of their requirements. Now you can identify and prevent this latent threat by supplying and withholding privileges. Access is only given to users access when they need it.
All privileged users gain risk scores reflecting behavioural baselines. SysAdmins can then use these scores to address security risks.
As a result, you can remove any doubt surrounding access rights.
Compare privileged user data. Preemptively display clear cases of exposed risks to infrastructure and give users privileges that fit their requirements - never under-privilege, never over-privilege. Baselines constantly adapt and update to mirror privileged use patterns.
The PxM Platform creates a profile for each privileged user in your organisation. Due to this, you can observe whenever a user’s access address differs from the existing baselines. If a user logs in more frequently from a given address, the lower their suspicion becomes.
Gain access to our PBM datasheet
Download the PBM module datasheet for a full technical breakdown, including a full feature list.