Get proactive with intelligent threat detection. Receive notifications the moment risky, non-compliant employee behavior occurs.

Results

Desjardins

With Prime, I can expedite investigations by seeing how a specific data element got out an environment, and how it moved across employees. I also see clear indicators of risk levels to more easily weed out false positives and prioritize the most malicious threats to the least with confidence.

– Frederic Michaud, Principal Director, Evolution of Cybersecurity Threats, Desjardins

Why Prime

In order to help prevent insider data breaches, Prime looks at user behavior. Here’s how it works:

Prime detects sensitive data elements within your business systems.

It registers specific data elements and begins tracking employee interactions with them.

Prime monitors your critical data 24/7 and alerts you the moment risky, non-compliant behavior occurs.

Prime advantage

Expedited investigations

When it comes to investigating incidents, every second counts. See how individual credit card or bank numbers moved across employees – in this case, from Nicholas, to Paul, to Laura – without doing anything manually.

Risk scores and intelligence

Get proactive with intelligence that enables action before an incident occurs. View risk by the department and understand how it changed over time. Add employees deemed risky to your intelligence dashboard for even closer monitoring.

Features by role

For the CISO, CIO and VP of Security

For Analysts and Admins

What Prime scans

How Prime works

Deploy

Deploy Prime for automatic monitoring of blindspots, including endpoints, cloud drive and workstations.​

Discover

Prime registers and monitors employee interactions with every piece of sensitive data that enters your business systems.

Detect

Know instantly when problematic accumulation, exfiltration, or deletion of data occurs.

Decide

Automate investigations with real-time views of data movement across employees over time.

Deploy

Deploy Prime for automatic monitoring of blindspots, including endpoints, cloud drive and workstations.​

Discover

Prime registers and monitors employee interactions with every piece of sensitive data that enters your business systems.

Detect

Know instantly when problematic accumulation, exfiltration, or deletion of data occurs.

Decide

Automate investigations with real-time views of data movement across employees over time.

FAQs

Prime gives you everything you need to prevent a data breach or data spill caused by disgruntled, negligent or careless employees.

Only Prime offers these five things:

  1. Scanning and monitoring of the specific sensitive data elements in your file. Why does this matter? In order to truly understand risk, you need to understand user behavior. Looking at file activity – as 99% of the tools on the market do – is insufficient. One file could have 1000s of data elements. When assessing risk, you need visibility into what’s in the file. Prime sees into your files, registers the data type, and assigns a risk score – based on what risk looks like for your business.
  2. 24/7 monitoring with proactive notifications of non-compliant or policy-violating behavior. Prime monitors interactions with every individual sensitive data element in your business systems and alerts you instantly when risky interactions with sensitive data or policy violations occur.
  3. Prime cuts down on false positives, focusing your team on critical areas of exposure at breakneck speed. Not all types of sensitive data carry an equal risk for every business. Prime is configurable and oriented around your specific business needs. It registers, scores and monitors specific data elements. It then ranks the biggest risks to your business. With clear indicators of risk levels, InfoSec teams more easily prioritize the most malicious threats to the least with confidence.
  4. Tracking at the data element level enables expedited investigations. Prime helps eliminate manual investigations. It automatically displays how a specific data element traveled from employee to employee over time – without you having to do anything manually. See how it got out of a secure environment, where it ended up, and every step in between.
  5. Prime’s data intelligence dashboard surfaces actionable intel – not post-mortem views. On your data intelligence dashboard, you’ll see risk levels by department and employee. You’ll also see how risk has changed over time. With your customizable view, you can also add employees deemed “risky” for closer monitoring.

Prime detects and alerts you to the below areas, with several more being rolled out in our upcoming releases.

  1. Data exfiltration
  2. Excessive sensitive information accumulation
  3. Unusual collection of specific types of sensitive information
  4. Deletion of files containing sensitive information

Prime monitors sensitive data elements in more than 135 file extensions.

Custom rules can be created to find specific data elements, such as a particular credit card number.

In addition, Prime can also search for custom data elements and proprietary IP.

Unlike CPU hungry legacy tools, with Prime, you decide how much CPU Prime utilizes. Customize it according to your needs.

To run Prime, you need both the endpoints and the platform to be functional.

Deployment is fast, and can be accomplished within a few hours. Your desktop or server teams deploy the sensor to the endpoints using your preferred deployment tool, such as SCCM. Once deployed and activated, you can configure the sensor in your Prime dashboard.

The recommended requirements for using Prime to monitor your endpoints are as follows:

  • Operating System: Windows 10 and 11
  • Processor: 2 or more CPU cores @ 2.40GHz + pageable RAM
  • Memory: 8GB + RAM
  • CPU Architecture: 64-bit
  • Disk Space: 5 GB of available space
  • Disk Throughput: 15,000 IOPS (60 MB/s+)

Prime is designed to operate entirely within your environment. We believe in data privacy – including yours and do not have access to your data.

Contact us​

Sensitive data inventory
Meet PII and PCI audits
Ensure GDPR, NYDFS compliance
Improve data governance
Drive SOC 2 certification
Insider threat monitoring
Lockdown endpoints
Detect policy violations in real-time
Expedite investigations
Quantify risk levels for the Board
Defying legacy limitations
What our customers say