Logo Qohash
logo qostodian
prime-logo

Qostodian Prime

Get proactive with intelligent threat detection. Receive notifications the moment risky, non-compliant employee behavior occurs.

Results

We now manage sensitive data more effectively. We monitor risky employees and receive real-time, actionable alerts when non-compliant behavior occurs. We also automatically see how data moved across employees.

Frederic Michaud

Frederic Michaud

Principal Director, Evolution of Cybersecurity Threats, Desjardins

Desjardins logo
Green rotating cube

Why Prime

In order to help prevent insider data breaches, Prime looks at user behavior. Here’s how it works:

Prime card

Prime detects sensitive data elements within your business systems.

Prime business systems

It registers specific data elements and begins tracking employee interactions with them.

Risk tracking interaction

Prime monitors your critical data 24/7 and alerts you the moment risky, non-compliant behavior occurs.

Prime advantage

Expedited investigations

When it comes to investigating incidents, every second counts. See how individual credit card or bank numbers moved across employees – in this case, from Nicholas, to Paul, to Laura – without doing anything manually.
Qohash risk score list
Qohash risk score

Risk scores and intelligence

Get proactive with intelligence that enables action before an incident occurs. View risk by the department and understand how it changed over time. Add employees deemed risky to your intelligence dashboard for even closer monitoring.

Features by role

For the CISO, CIO and VP of Security

For Analysts and Admins

What Prime scans

Microsoft 365 cloud
Microsoft 365 cloud
Prime on-premises
Prime on-premises

How Prime works

Recon works cube

Deploy

Deploy Prime for automatic monitoring of blindspots, including endpoints, cloud drive and workstations.​

Discover

Prime registers and monitors employee interactions with every piece of sensitive data that enters your business systems.

Detect

Know instantly when problematic accumulation, exfiltration, or deletion of data occurs.

Decide

Automate investigations with real-time views of data movement across employees over time.

Recon works cube

Deploy

Deploy Prime for automatic monitoring of blindspots, including endpoints, cloud drive and workstations.​

Discover

Prime registers and monitors employee interactions with every piece of sensitive data that enters your business systems.

Detect

Know instantly when problematic accumulation, exfiltration, or deletion of data occurs.

Decide

Automate investigations with real-time views of data movement across employees over time.

FAQs

Prime gives you everything you need to prevent a data breach or data spill caused by disgruntled, negligent or careless employees.

Only Prime offers these five things:

  1. Scanning and monitoring of the specific sensitive data elements in your file. Why does this matter? In order to truly understand risk, you need to understand user behavior. Looking at file activity – as 99% of the tools on the market do – is insufficient. One file could have 1000s of data elements. When assessing risk, you need visibility into what’s in the file. Prime sees into your files, registers the data type, and assigns a risk score – based on what risk looks like for your business.
  2. 24/7 monitoring with proactive notifications of non-compliant or policy-violating behavior. Prime monitors interactions with every individual sensitive data element in your business systems and alerts you instantly when risky interactions with sensitive data or policy violations occur.
  3. Prime cuts down on false positives, focusing your team on critical areas of exposure at breakneck speed. Not all types of sensitive data carry an equal risk for every business. Prime is configurable and oriented around your specific business needs. It registers, scores and monitors specific data elements. It then ranks the biggest risks to your business. With clear indicators of risk levels, InfoSec teams more easily prioritize the most malicious threats to the least with confidence.
  4. Tracking at the data element level enables expedited investigations. Prime helps eliminate manual investigations. It automatically displays how a specific data element traveled from employee to employee over time – without you having to do anything manually. See how it got out of a secure environment, where it ended up, and every step in between.
  5. Prime’s data intelligence dashboard surfaces actionable intel – not post-mortem views. On your data intelligence dashboard, you’ll see risk levels by department and employee. You’ll also see how risk has changed over time. With your customizable view, you can also add employees deemed “risky” for closer monitoring.

Prime detects and alerts you to the below areas, with several more being rolled out in our upcoming releases.

  1. Data exfiltration
  2. Excessive sensitive information accumulation
  3. Unusual collection of specific types of sensitive information
  4. Deletion of files containing sensitive information

Prime monitors sensitive data elements in more than 135 file extensions.

Custom rules can be created to find specific data elements, such as a particular credit card number.

In addition, Prime can also search for custom data elements and proprietary IP.

Unlike CPU hungry legacy tools, with Prime, you decide how much CPU Prime utilizes. Customize it according to your needs.

To run Prime, you need both the endpoints and the platform to be functional.

Deployment is fast, and can be accomplished within a few hours. Your desktop or server teams deploy the sensor to the endpoints using your preferred deployment tool, such as SCCM. Once deployed and activated, you can configure the sensor in your Prime dashboard.

The recommended requirements for using Prime to monitor your endpoints are as follows:

  • Operating System: Windows 10 and 11
  • Processor: 2 or more CPU cores @ 2.40GHz + pageable RAM
  • Memory: 8GB + RAM
  • CPU Architecture: 64-bit
  • Disk Space: 5 GB of available space
  • Disk Throughput: 15,000 IOPS (60 MB/s+)

Prime is designed to operate entirely within your environment. We believe in data privacy – including yours and do not have access to your data.

Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​