Sharelock

Identity Behavioral Insights for the Zero trust Identity architecture

Welcome to the new age of 'Bottom-up' Identity Management based on Behavioral Insights

Sharelock enables an innovative bottom-up approach to Identity Management based on understanding user’s behaviour rather than just relying on central IAM policies.

Sharelock disrupts the business of Identity-centric anomaly detection based on its own patented machine learning algorithms.

Sharelock provides its Identity and Access Governance insights in two distinct domains:

  • Insider Threat Prevention such as data exfiltration attempts, compromised accounts, shared and ghosts credentials.
  • Compliance recommendations, aiming to close the gap between a ‘should be’ state described in IGA platforms vs the ‘as- is‘, based on actual user behaviours.
Open Architecture
Open Architecture

Insider Threat and Fraud detection

Sharelock Threat and Fraud Detection capabilities allow to spot risky behaviors, understand the risk stage, and investigate the dangerous situations at the user level. Sharelock enables a set of powerful user-centric insights for investigation purposes, such as timeline analysis, peer-analysis, and behavioral analysis.

 

Insider Threat and Fraud detection

Compliance recommendations

Sharelock access compliance allows you to measure and reduce the ‘gap’ between the ‘should be’ vs. the ‘as-is’ on access provisioning policies. In simple terms, companies use IGA platforms to define and enforce what their users should have access to, according to their duties and roles. Unfortunately, users may either obtain ‘out of policies’ access permissions or be over-provisioned. Both situations create a ‘compliance’ issue, which often proves to be the ‘early signal’ which then turns into a subsequent insider threat security incident.

Sharelock provides insights and spots incompliant users, comparing any given user with its peers, then recommending remediation actions to achieve a compliant and secure ‘access posture’.

Compliance recommendations

Discover our wealth of benefits!

01

Zero-days start

Forget about rules, the system learns and sets behavioural baselines automatically. Forget also about preparing training datasets,  Sharelock operates unsupervised. Sharelock saves at least 4-5 months of project efforts and costs compared to old-style products.

02

Massive reduction of false positives

Unlimited Identity-centric Indicators of Behaviour reduce the likelihood of false positives by over 21% compared to other ML-powered solutions.

 

03

Enrich 'Identity-less' log files

Many log files are Identity-less, frequently with only the originating IP and Mac address. Sharelock has the wisdom to enrich them, leveraging our patented Identity-enrichment ML models.

04

An open and evolving ML catalog

Sharelock ML model catalog is an evolving creature and keeps the pace with state-of-the-art ML models. Sharelock adds new ML models to the catalog, without any impact on the underlying technology and client skills.

05

A pricing model you can control

Forget about EPS, Terabytes, and other opaque pricing models.
Sharelock pricing model is based on the number of Identities, plus connected applications.
Simple metrics you can control.

06

Patented Technology

Sharelock has patented its behavioral models, proving our unprecedented thought leadership. Few vendors in this space can claim patents.

The voice of the Customer

“We live and breathe user behavioral insights. We have seen plenty of Cybersecurity vendors talking endlessly about Machine Learning and AI, but none of them could fit with our agility requirements.

When we tested Sharelock, we finally saw the simplicity we were looking for and an actionable approach to Identity-centric Threat prevention”.

(CISO, Global Financial Information Provider)

The voice of the Customer

Sharelock vs. Competition

Sharelock has designed its behavioral platform with a bright design principle: innovate over existing players to maximize accuracy detection and dramatically reduce false positives.

SHARELOCK

COMPETITION

THE SHARELOCK ADVANTAGE

ML Models

"Do we need to build training dataset for your Machine Learning Models?"

SHARELOCK

UNSUPERVISED

COMPETITION

SUPERVISED

THE SHARELOCK ADVANTAGE

Sharelock does not require any labelled training dataset (e.g. log file where anomalies are tagged”). Over 4-5 months efficiency in activation costs & efforts.

 

Behavioral baseline

"How is the behavioral baseline defined?"

SHARELOCK

USER BASELINE

COMPETITION

DATASET BASELINE

THE SHARELOCK ADVANTAGE

Sharelock does not require a minimum amount of users to run the ML models efficiently. Likelihood of False Positives reduced by over 21%.

 

Identity enrichment

“How do we enrich Identity-less log records?”

SHARELOCK

Machine Learning models and Identity Integration

COMPETITION

Just Identity Integration

THE SHARELOCK ADVANTAGE

Sharelock allows enriching log records with Identity attributes even in the absence of information such as account name or other user-related attributes. Prompt detection, reduction of the Investigation efforts.

 

Don't hesitate to

Get in Touch

Our team will be pleased to help you  address any need and answer any question!