Sharelock

AI-powered Security & Identity Behavioral Analytics

Welcome to the new age of cybersecurity and access compliance telemetry

Sharelock dramatically innovates the business of detecting Identity-centric anomalies based on AI-driven behavioral analysis.

Our platform collects Data from any source (e.g., application log file, sensors), learns and defines a behavioral baseline for each user, and, the ultimate goal, detects behavioral anomalies.

Sharelock operates using its own patended machine learning algorithms, clearly proving our thought leadership in the space. 

Sharelock provides its insights into two distinct domains:

  • Insider Threat Detection use-cases such as data exfiltration, and lateral movements, leveraging our Indicators of Behavior (IoB) algorithms.
  • Access’ compliance anomalies, aiming to provide recommendations to reduce the compliance gap between a should be’ state described in IGA platforms vs. the ‘as is one, based on actual user behaviors.
Open Architecture
Open Architecture

Insider threat detection

Sharelock Threat Detection capabilities allow to spot risky behaviors, understand the risk stage (according to a kill-chain based staging process), and investigate the dangerous situations at the user level. Sharelock enables a set of powerful user-centric insights for investigation purposes, such as timeline analysis, peer-analysis, and behavioral analysis.

 

Insider threat detection

Identity and access compliance

Sharelock access compliance allows you to measure and reduce the ‘gap’ between the ‘should be’ vs. the ‘as-is’ on access provisioning policies. In simple terms, companies use IGA platforms to define and enforce what their users should have access to according to their duties and roles. Unfortunately, users may either obtain ‘out of policies’ access permissions or be over-provisioned. Both situations create a ‘compliance’ issue, which has often proved to be the ‘early signal’ which then turned into a subsequent insider threat security incident.

Sharelock provides insights and spot incompliant users, comparing any given user with its peers, then recommending remediation actions to achieve a compliant and secure ‘access posture’.

Identity and access compliance

Discover our wealth of benefits!

01

No rules, No ML skills required

Forget about rules, the system learns and sets behavioral baseline automatically. No machine learning skills required, yet retaining full visibility and control on the Sharelock platform.

02

Massive reduction of false positives

Sharelock enables each client to build unlimited behavioral baselines for each user, allowing unprecedented accuracy on anomaly and threat detection.

03

Enrich 'Identity-less' log files

Many log files are Identity-less, very often with just the originating IP and Mac address. Sharelock has the wisdom to enrich them, leveraging our patented Identity-enrichment ML models.

04

An open and evolving ML catalog

Sharelock ML model catalog is an evolving creature and pacing with state-of-the-art ML models. Sharelock adds new ML models to the catalog, without any impact on the underlying technology and client skills.

05

Threat & compliance: 2 in 1

Sharelock enables threat detection use cases for cyberSecurity purposes as well as Identity analytics one for Identity & access governance compliance purposes.

06

SaaS and On-prem

Sharelock is a modern Born-for-the-cloud, fully microservice-based, API-first architecture. Sharelock offers the SaaS version as well as the on-premise deployment possibility. Same codebase, same functionalities.

07

A pricing model you can control

Forget about EPS, Terabytes, and other opaque pricing models.
Sharelock pricing model is based on the number of Identities plus connected applications.
Simple metrics you can control.

08

Patented Technology

Sharelock has patented its behavioral algorithms, proving our unprecedented thought leadership. Few vendors in this space can claim patents.

The voice of the Customer

“We live and breathe user behavioral insights. We have seen plenty of Cybersecurity vendors talking endlessly about Machine Learning and AI, but none of them could fit with our requirements of simple to run&maintain platform. When we saw and tested Sharelock, we finally saw the simplicity we were looking for and a clean and understandable approach to AI-powered Identity & Security Analytics”.

(CISO, Global Financial Information Provider)

The voice of the Customer

Sharelock vs. Competition

Sharelock has designed its behavioral platform with a bright design principle: innovate over existing players to maximize accuracy detection and dramatically reduce false positives.

SHARELOCK

COMPETITION

SHARELOCK PLUS VS. COMPETITION

ML Models

"Do we need to build training dataset for your Machine Learning Models?"

SHARELOCK

UNSUPERVISED

COMPETITION

SUPERVISED

SHARELOCK PLUS VS. COMPETITION

Sharelock does not require any tagged training dataset (e.g. log files where anomalies are manually tagged). Huge reduction in activation costs & efforts.

Behavioral baseline

"How is the behavioral baseline defined?"

SHARELOCK

USER BASELINE

COMPETITION

DATASET BASELINE

SHARELOCK PLUS VS. COMPETITION

Sharelock hugely increases accuracy and reduces false positives. Sharelock does not require a minimum amount of users to run the ML models efficiently.

Identity enrichment

“How do we enrich Identity-less log records?”

SHARELOCK

Machine Learning models and Identity Integration

COMPETITION

Just Identity Integration

SHARELOCK PLUS VS. COMPETITION

Sharelock allows enriching log records with Identity attributes even in the absence of information such as account name or other user-related attributes.

Don't hesitate to

Get in Touch

Our team will be pleased to help you answer any needs and questions!