Veriato Recon Features

Anomaly Detection

Behaviors related to the most common ways insiders - whether they are acting maliciously or negligently - take data out of the control of the organization. Veriato Recon watches for anomalies in data movement, including moving of information to shadow IT cloud solutions and removable storage, print patterns, email usage (still the most common way a true insider removes sensitive or proprietary information), and more.
These shifts can also be indicative of compromised credentials. In addition to looking for deviations in data access and movement, the solution also watches for unusual login activity that indicates stolen credential usage.
Anomaly Detection
The way we communicate and the way we act are related. The solution also watches shifts in language usage that can provide early warning that an insider is going rogue. These psycholinguistic indicators, including shifts in language pattern matching, pronoun usage, and the tone and intensity of corporate communications, add a layer of richness to an individual’s behavioral profile, assisting with prioritization of potential threats.