Software

Ava REVEAL

by Ava Security

Logo of Ava Secuirty

Key Facts

  • Automate threat detection and response from day 1 with Reveal’s policies. Reveal offers: both out-of-the- box (OOTB) and configurable policies that you can customize to align with your IT policies and security needs.
  • Reveal’s breakthrough machine learning combines multiple algorithms that monitor user, entity, and network behavior to detect security threats.
  • Locks a computer if malicious intent is identified. Isolates an infected computer or server to prevent malicious software from spreading. Takes a screenshot to capture an image of a user’s desktop. Displays message to prompt an end user with a custom message.

Categories

  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security

Key Facts

  • Automate threat detection and response from day 1 with Reveal’s policies. Reveal offers: both out-of-the- box (OOTB) and configurable policies that you can customize to align with your IT policies and security needs.
  • Reveal’s breakthrough machine learning combines multiple algorithms that monitor user, entity, and network behavior to detect security threats.
  • Locks a computer if malicious intent is identified. Isolates an infected computer or server to prevent malicious software from spreading. Takes a screenshot to capture an image of a user’s desktop. Displays message to prompt an end user with a custom message.

Categories

  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security
Show More

PRODUCT DESCRIPTION

Preventing insider risks with a human-centric solution Companies tend to overestimate the impact a malicious outsider has on an organization. What the malicious outsider wants–direct access to sensitive data–is exactly what insiders such as employees, contractors, and third parties have by design, where the real risk lies. As malicious insiders are responsible for the costliest data breaches, and human error is considered the main cause of data breaches, Reveal is designed with human behavior in mind. Reveal strengthens your defence against insider risks–malicious, careless, and accidental. Reveal identifies emerging security threats by gathering and analyzing millions of events each day against a series of sensors including, machine learning, behavioral analytics, and lastly policy sensors. As Reveal Agents continuously record events, specific models of behavior are built for users over time. These models enable Reveal to recognize abnormal and suspicious activity and raise alarms for perceived threats. Security analysts can protect against a breach or attack by initiating actions. Depending on the severity of the threat, analysts can take a screenshot of a user’s computer screen, kill and block connections to a device, or lock a device’s keyboard and mouse.

Show More
graphical blue background

Ava REVEAL

Product Expert