Post on 27-Apr-2018
transcript
© Copyright Confidential2
• Cloud-based post-hire background screening & continuous monitoring software• Patented, proprietary, proven software system with high availability and scalability
IDentrix is a leading provider of analytics for detecting and deterring insider threat risk.
Who is IDentrix
IDentrix History of Success
15-Year Track Record helping government combatterrorism, fraud and insider threats
Originally developed to help the FBI screen flight school applicants after 9/11
3
Comprehensive Public Data Sources
IDentrix continuously scans 1,500federal, state and county public data sources
• Wants and Warrants• Bookings and Arrests• Criminal History• Sex Offenders
Criminal• Bankruptcy• Liens and Judgments• Lawsuits• Foreclosures
Civil• Professional Licenses• Driver’s Licenses• Healthcare Licenses• Concealed Weapons
Licenses• Healthcare• OFAC • Terrorist Watchlists• Criminal Watchlists
Sanctions
© Copyright Confidential5
Start with External Pressure
© Copyright Confidential6
“About 80% of these insiders can be caught using rules and monitoring employees’ behaviors and the pressures they face in their personal lives.”
Gartner Security and Risk Management Summit 2016
Cognition/Evaluation – How it Works
Evaluate Impact
Negative Impacts
Positive Impacts
• Indication of fraud• Criminal History• Negative Financial History• Loss of License• Etc.
• Verified identity• Verified background• Lack of Criminal History• Positive Financial History• Etc.
Identity Events• Fraud• Relationships• Background
• Criminal• Financial• Etc.
• Social Media• Licenses• Assets• Business Affiliation• IT Security• Human Resources
Identity Scoring
Identity Alerts
• Alert Type Categorization• Thresholds Analysis• Automated Notifications
• Numerical Scoring• Positive/Negative Factors• Score Trend Analysis
Inform CustomerDetect & Validate
Identity Events
7
Weak vs. Strong Insider Threat Signals
© Copyright Confidential8
Low Effort
High EffortLow knowledge = weak human signals
High knowledge
IT Behavioral Pattern Recognition
Access Management
HR Appraisals and Reviews
Employee External Monitoring
Combined Data
How we are Different
© Copyright Confidential9
1. Continuous Monitoring – automates the analysis of multiple sources of information to perpetually evaluate changes in personal background and behavior risks.
2. Identity Visualization – creates situational awareness through a 360 degree view of individuals and risks through advanced data visualization.
3. Risk Alerts – provides automated notifications of potential identity-based risks due to changes in a person’s background or behavior.
4. Legally-defensible Audit Trail – digitally links identity, process and decision data, to ensure efficient and cost-effective compliance with security and privacy regulations.
Easy, Transparent, Accurate
1. Selected through a multiple vendor review process2. Fast, easy implementation of less than a week3. No technology involvement required to start4. Provided the most comprehensive source of real-time alerts5. Alerting process was easy for the client to act6. Competing alerts were obscured in other parts of competitor’s
offering7. IDentrix optimized customer’s alerts to match against role, location
and severity of the incident8. The reason for an alert was transparent and easily traceable to the
original record9. 100% accuracy in data capture and assignment of alerts to the right
employee
© Copyright Confidential
“Number of data sources and speed
was huge.”
11
-Global Aviation Security Officer
Customer Neptune Results
• Enrolled 30,000 identities• Monitored thousands of sources• Detected over 800 incidents• Independently investigated and
verified arrest alerts• Disqualified 24 employees
© Copyright Confidential
“With IDentrix, we can save 40 percent of traditional screening costs.”
12
Customer Neptune Alerts
Bookings/Arrests• Criminal Possession• Intent to sell marijuana• Drug related, intent to sell
Criminal Charges• First degree assault• Second degree robbery• Receiving stolen property• Criminal possession• Stolen property; weapon• Felony possession• Controlled substance• Injury/risk of injury to minor• Endangered welfare of a child• Photo sexual act
© Copyright Confidential
Sanctions• Prohibition from working on
Government Contracts
Sex Offenders• Multiple sex offenses
Death Records• 9 Recorded Deaths
13
• Enrolled 60,000 identities• Monitored thousands of sources• Detected over 1,771 incidents• Evaluated risk for follow-up
action
Customer Falcon Results
© Copyright Confidential
“IDentrix alerts us of criminal conduct so we can get out in front and respond as needed.”
14
Customer Falcon Alerts
Bookings/Arrests• Felony Theft• Burglary• Drug Possession• Intent to distribute• False imprisonment• Second degree assault• Criminal damage to property• Receiving stolen property• Assault and battery• Cruelty to children• Strangulation
Criminal Charges• Criminal felony• Rape• Assault• Theft• Burglary• Property Crimes• Drug Violation• DUI• Felony narcotics possession• False impersonation, forgery
© Copyright Confidential
Death Records• 14 Recorded Deaths
15