Virtualization Technology News and Information
Preempt Introduces First Security Platform Based on Identity, Behavior and Risk
Preempt, a leader in adaptive threat prevention that helps enterprises eliminate security breaches and internal threats, today announced the expansion of its product suite with the introduction of the Preempt Platform. According to Verizon's 2017 DBIR, 25 percent of breaches involved internal actors and 81 percent of hacking-related breaches were aided by stolen or weak passwords. The Preempt Platform helps security teams who are struggling to balance the threat of cyberattacks, breaches and internal threats without disrupting business or overloading analysts with false positives. The Preempt Platform can progressively adapt based on situation and context and automatically challenge anomalous behavior and resolve false positives in real-time.  

Preempt continuously tracks the identitybehavior and risk of every enterprise user and adapts responses based on risk. Real-time insights are paired with business-appropriate responses that can adapt as situations change. Anomalous or risky behaviors can be challenged or redirected without disrupting user productivity. If risks increase, the solution can challenge users to verify their identity, reduce user privileges, force password changes, or ultimately block based on customizable policies.

By allowing security to adapt in real time, organizations can quickly solve a variety of security challenges such as being able to automatically respond in real-time to anomalous or risky behavior, proactively add secure access control, manage and protect privileged and service accounts and resolve risk and weaknesses before they are exploited by attackers. This flexibility opens up a variety of use cases and also allows organizations to leverage existing security solutions in new ways.

"To securely enable digital business initiatives in a world of advanced, targeted attacks, security and risk management leaders must adopt a continuous adaptive risk and trust assessment strategic approach to allow real-time, risk and trust-based decision making with adaptive responses," wrote Neil MacDonald, VP Distinguished Analyst  at Gartner, and Felix Gaehtgens, Research Director at Gartner, in the reportUse a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced ThreatsThe CARTA approach is fundamental to how the Preempt Platform is architected.

"Detection only solutions today are not enough. We needed a proactive solution to help us get ahead of threats. Preempt's approach of being able to adapt and automatically prevent threats based on identity, behavior and risk has provided tremendous value" said Grant Sewell, Head of Global Information Security at Scotts Miracle-Gro. "The ease of deployment and extensibility of its platform also helps enable us as we move to more cloud based applications and infrastructure."

At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a policy engine. These capabilities help to power the platform for delivering a scalable set of applications that help customers to prevent threats and support broad set of use cases. The applications include:

  • Behavioral Firewall:real-time, automated and situational threat prevention and enforcement. Its goal is to detect, challenge and respond to threats and risky behavior without getting a security analyst involved.
  • Any App:allows organizations to easily expand secure authentication to any on-premise or cloud application without additional development. Any App is vendor neutral and can complement and extend a typical MFA deployment from a variety of vendors.
  • Insights:provides instant visibility into security posture enabling security teams to resolve risks and weaknesses before they are exploited. Insights can quickly find privileged accounts, use of shared accounts, use of unmanaged devices, weak or exposed passwords, or passwords that never expire.
  • Threat Hunter:allows security analysts to proactively search raw events, detect and identify security events or further investigate reported events. It can also be used to find and eliminate threats such as administrative account lockouts, privilege escalation and failed logins.

Designed with an extensible architecture and centralized management, the Preempt Platform easily integrates with other security solutions to gain deeper context for threat detection and gain more threat enforcement options for stopping threats. No endpoint software agents are required, and installation is typically completed in a few hours, providing significant value on day one and increasing value over time for high impact and a low total cost of ownership.

To learn more about the Preempt Platform, visit:

Published Monday, December 11, 2017 10:48 AM by David Marshall
Filed under:
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<December 2017>