Welcome!

News Feed Item

Preempt Introduces New Adaptive Threat Prevention Platform

Extensible Platform Continuously Preempts Threats Based on Identity, Behavior and Risk

SAN FRANCISCO, Dec. 7, 2017 /PRNewswire/ -- Preempt, a leader in adaptive threat prevention that helps enterprises eliminate security breaches and internal threats, today announced the expansion of its product suite with the introduction of the Preempt Platform. According to Verizon's 2017 DBIR, 25 percent of breaches involved internal actors and 81 percent of hacking-related breaches were aided by stolen or weak passwords. The Preempt Platform helps security teams who are struggling to balance the threat of cyberattacks, breaches and internal threats without disrupting business or overloading analysts with false positives. The Preempt Platform can progressively adapt based on situation and context and automatically challenge anomalous behavior and resolve false positives in real-time. 

Preempt Security Logo (PRNewsfoto/Preempt)

Preempt continuously tracks the identity, behavior and risk of every enterprise user and adapts responses based on risk. Real-time insights are paired with business-appropriate responses that can adapt as situations change. Anomalous or risky behaviors can be challenged or redirected without disrupting user productivity. If risks increase, the solution can challenge users to verify their identity, reduce user privileges, force password changes, or ultimately block based on customizable policies.

By allowing security to adapt in real time, organizations can quickly solve a variety of security challenges such as being able to automatically respond in real-time to anomalous or risky behavior, proactively add secure access control, manage and protect privileged and service accounts and resolve risk and weaknesses before they are exploited by attackers. This flexibility opens up a variety of use-cases and also allows organizations to leverage existing security solutions in new ways.

"To securely enable digital business initiatives in a world of advanced, targeted attacks, security and risk management leaders must adopt a continuous adaptive risk and trust assessment strategic approach to allow real-time, risk and trust-based decision making with adaptive responses," wrote Neil MacDonald, VP Distinguished Analyst  at Gartner, and Felix Gaehtgens, Research Director at Gartner, in the report, Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats. The CARTA approach is fundamental to how the Preempt Platform is architected.

"Detection only solutions today are not enough. We needed a proactive solution to help us get ahead of threats. Preempt's approach of being able to adapt and automatically prevent threats based on identity, behavior and risk has provided tremendous value" said Grant Sewell, Head of Global Information Security at Scotts Miracle-Gro. "The ease of deployment and extensibility of its platform also helps enable us as we move to more cloud based applications and infrastructure."

At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a policy engine. These capabilities help to power the platform for delivering a scalable set of applications that help customers to prevent threats and support broad set of use cases. The applications include:

  • Behavioral Firewall: real-time, automated and situational threat prevention and enforcement. Its goal is to detect, challenge and respond to threats and risky behavior without getting a security analyst involved.
  • Any App: allows organizations to easily expand secure authentication to any on-premise or cloud application without additional development. Any App is vendor neutral and can complement and extend a typical MFA deployment from a variety of vendors.
  • Insights: provides instant visibility into security posture enabling security teams to resolve risks and weaknesses before they are exploited. Insights can quickly find privileged accounts, use of shared accounts, use of unmanaged devices, weak or exposed passwords, or passwords that never expire.
  • Threat Hunter: allows security analysts to proactively search raw events, detect and identify security events or further investigate reported events. It can also be used to find and eliminate threats such as administrative account lockouts, privilege escalation and failed logins.

Designed with an extensible architecture and centralized management, the Preempt Platform easily integrates with other security solutions to gain deeper context for threat detection and gain more threat enforcement options for stopping threats. No endpoint software agents are required, and installation is typically completed in a few hours, providing significant value on day one and increasing value over time for high impact and a low total cost of ownership.

To learn more about the Preempt Platform, visit: https://www.preempt.com/product/.

Source: Gartner, "Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats," Neil MacDonald, Felix Gaehtgens, 22 May 2017.

About Preempt
Preempt protects organizations by eliminating insider threats and security breaches. Threats are not black or white and the Preempt Platform is the only solution that delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com.

For further information, please contact:
Jacqueline Velasco
Lumina Communications for Preempt
T: 408-680-0564
E: [email protected]

View original content with multimedia:http://www.prnewswire.com/news-releases/preempt-introduces-new-adaptive-threat-prevention-platform-300568317.html

SOURCE Preempt

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.