Preempt is a US-Israel collaboration founded by Ajit Sancheti and Roman Blachman.

How does it work?

What we do is sit in front of the active directory domain controllers and monitors the traffic.

Protecting Your Data From Insider Threats

We work with many organizations, from under 100 employees to thousands of them.

Is your solution automatic or does it require people to operate it?

Many of the incidents are auto resolved and dont require any human intervention.

protecting your data from insider threats- ajit sanchetti preempt

The idea is not to stop business processes, but to ensure they remain secure.

The fact that behavior is so dynamic requires us to do a whole lot of learning.

Most access is controlled by identity.

protecting your data from insider threats- ajit sanchetti preempt

Have you found any behavioral patterns with your customers?

We’re seeing 2-3 patterns.

Many companies want control over their privileged users,

while others are more concerned about contractors and external consultants.

protecting your data from insider threats- ajit sanchetti preempt

At the end of the day, they all want to have visibility.

Can you characterize a malicious insider?

Companies trust their employees, giving them access to just about everything, and thats the challenge.

Article image

Such behaviors pose a significant threat to the organization’s security.

There are also malicious insiders who are knowingly doing insecure things for personal gain.

We can challenge the user with an extra layer of authentication and we can block them if needed.

Article image

Do companies tell their employees about your system?

Most companies dont tell their employees about it, because they want to monitor their employees' behavior objectively.

My belief is that companies that do share this information will end up more secure.

Article image

How do companies react when insider threats are detected?

So, they know their actions are being tracked.

What would you advise to companies who wish to secure their networks from the inside?

Article image

In many cases, employees have access to more than what they need to do their jobs.

Secondly, they should educate employees on the implications of their actions.

The more awareness to user behavior the more secure and effective the business will become.

Article image

How do you see the future of enterprise information security?

Behavioral Firewalls enable that transformation.

c’mon, comment on how to improve this article.

protecting your data from insider threats- ajit sanchetti preempt