- Use Cases
LONDON, UK. -- Veriato, an innovator in user behaviour analytics and a global leader in user activity monitoring, convened its second annual UK Police User Group in late January to discuss the best practices of preventing corruption among law enforcement agencies. Police units use Veriato solutions to collect and inspect computer activity data to identify potential high-risk incidents of evidence tampering or leaks. Veriato is used to both prevent potential actions, and to provide detailed information for investigations of potential breaches.
Using Veriato's proprietary user activity monitoring and behaviour analytics systems, police forces can identify both accidental and purposeful fraud based on patterns of behaviour. The system flags potential incidents and then allows investigators to inspect the computer activity of the individual in very specific context of the action with details about what the officer communicated, transferred or downloaded, etc.
"For more than 10 years, Veriato has been helping police forces identify and prosecute potential information leaks and evidence tampering," said Paul Down, Vice President, EMEA & APAC at Veriato. "With Veriato's solutions, police staff are not chasing false positive reports and can be more effective and efficient in preventing and tracking corruption."
As required by the Police Act of 1996 and as governed by Her Majesty's Chief Inspector of Constabulary (HMIC), police forces are required to monitor all officers and employees to maintain integrity and professional standards. Veriato solutions help police forces stay in compliance with the law and HMIC, identifying and reducing corruption in the UK without an increased burden on investigators or the supporting IT systems.
"We are pleased to be partnering with UK police forces to help them maintain integrity and professional standards of evidence collection and prosecution," said Mike Tierney, chief operating officer at Veriato. "Our software can help all organisations protect their valuable data from insider threats that can jeopardize critical business operations."
Veriato's award-winning products - Veriato 360 and Veriato Recon - help mid-sized and large organisations prevent and detect insider threats. The products combine user behaviour analytics and user activity monitoring to detect both anomalies in employee behaviour and potential actions that can compromise data security. More than 36,000 companies, schools, and government entities worldwide use Veriato solutions to gain insight into the user activity on their network.