Web Activity

Significantly more sophisticated than browser history, Cerebral records, and maintains information about web activity, including webmail usage, file uploads, and how long a user was engaged or active on a site.

Compromised Credentials

Cerebral monitors access to workstations and servers for unusual access by IP addresses, geolocation, and more.

Email Activity

Capture communications activity in traditional email clients as well as many popular webmail services. A searchable system of records that can be alerted and reported on.

Chat & IM Activity

Capture, scan, alert and report on communications activity occurring on commonly used messaging apps; creates a definitive record for compliance and investigative uses.

Psycholinguistic Analysis

Using computational linguistic analysis, Cerebral can identify and categorize opinions expressed in email text, to determine the writer's sentiment and sentiment changes that can point towards disgruntled workers and possible security risks.

Network Activity

Autonomously captures connections made by applications, including ports used and bandwidth consumed as well as time and location of connection

File & Document Tracking

Tracks activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.

Keystroke Logging

When needed, the option to record every keystroke, including “hidden” characters and combinations, insures you have the visibility you need into the activity of highly privileged users. With the Cerebral keylogger feature, all keystrokes can be recorded.

Application Activity

Captures all application usage to provide true reporting on what applications are open, being actively used, by who, and for how long.


Data on the location of an Android device can be tracked as well as configured to alert security when a user device enters a restricted location or moves outside a specified geographic area.

User Status

Produces an accurate record of session time and activity. Tracks logon and logoff but does not rely on logoff to identify when session activity ends.

Dark Web Tracking

Get alerted when employees access the Dark Web using the Tor Browser.

Risk Scoring

Actions and activities all play a part in building a comprehensive Risk Score for each user on your network. This activity data is then used to rank risky users in a watchlist which can efficiently be used to prioritize, predict and prevent potential threats. The score based on multiple factors including everything from files downloaded to unauthorized access from an unknown Geo location. Scores can be quickly reviewed in the Risk Score Dashboard. Additionally, once an employee reaches a certain threshold (established by your security team), an alert is sent, and action can be taken. Risk scores help companies to maximize efficiency and prioritize their cybersecurity efforts.

Anomaly Detection

Detects deviations from established patterns enabling early warning of insider threats.


Self-learning of behavioral patterns for individuals and groups, driven by advanced machine learning, enables no-touch understanding of what normal looks like for everyone in your environment.

Learn More
Online Test Drive
Schedule Demo

Learn More