Fortscale Insider Blog

02 Nov User Experience Design – The User’s Perspective

"Design is a funny word. Some people think design means how it looks. But of course, if you dig deeper, it's really how it works."   Steve Jobs When I started practicing, UX designers frequently had to explain what it is they actually do. The common understanding was that engineers wrote the code, and then we, as designers, had to "prettify" their...

Read More

11 Oct Detecting Anomalies in a SMART Way – Part 3

In the first post of this series I described how we at Fortscale use a personalized adaptive threshold for triggering alerts. Each user’s activity is assigned a risk score (known as the SMART value) that triggers a SMART alert when it crosses the user’s threshold. We explained how the more anomalous activities a user performs through time, the higher his...

Read More

20 Sep Detecting Anomalies in a SMART Way – Part 2

In the previous post of this series I described how we at Fortscale use a personalized adaptive threshold for triggering alerts. Each user’s activity is assigned a risk score (known as the SMART value) that triggers a SMART Alert when crosses the user’s threshold. We explained how  the more anomalous activities a user performs through time, the higher his threshold...

Read More

06 Sep UEBA Should Provide Conclusions, Not Just Anomalies

As with all technologies, UEBA has evolved over time. We at Fortscale take a great deal of pride in working closely with both our large and small customers to understand their specific needs and to respond to those needs. Although UEBA has always provided more information and context then just SIEM or event logs, after listening carefully to our customers, we...

Read More

29 Aug No Rules!  UEBA as it Should be

When significant new technology appears in the marketplace, it’s always interesting to see how many vendors and products quickly jump on the band wagon to embrace it. The trouble is that with many of the vendors there is no real substance to their claims regarding the new technology. It’s often just talk; smoke and mirrors; and clever use of marketing...

Read More

15 Aug Detecting Insider Credentials Compromised on the Dark Web

For years, I've been fascinated with the Dark Web. In particular, the people who buy and sell information there, how they steal and hide information, and their motivations for their actions. Over the years, I've learned about the fraudsters' hierarchy. Talk about a crime ring! Fresh credit card details are sold based on a fraudster's rank within the organization - with...

Read More

15 Aug Detecting Remote Lateral Movement

Malicious Users Will Move Laterally to Abuse Internal Resources Leveraging legitimate employees’ credentials is known to be one of the main tools used by attackers that would like to infiltrate the enterprise. Apart from getting inside, it is also a common practice as part of the attacker lateral movement towards achieving its malicious intentions. The term ‘Lateral Movement’ refers to the attack...

Read More

15 Aug Fortscale for DLP

What is DLP? Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is used to describe software products that help a network administrator control what data end users can transfer.[1] We are proud to announce the addition of DLP to the wide range of...

Read More

15 Aug Fortscale for Secure Web Gateways

What is a Secure Web Gateway? A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization. It is used by enterprises to protect their employees/users from accessing and being infected by malicious Web traffic, websites and virus/malware.[1] We are proud to announce the addition of Secure Web Gateways to the...

Read More