Ava Reveal provides a set of out-of-the-box policies that rely on granular data and smart inspection patterns. These policies provide instant protection against many insider threat scenarios that put your organization at risk – like users accessing unsafe applications, using unapproved hardware, or opening unauthorized files.
Reveal also covers several exfiltration channels like email, file sharing tools, or physical storage devices. The interface provides intuitive means of selecting, managing, and modifying policies. Policies can be activated on-demand – with a single click. And they are fully customizable, allowing operators to model Ava Reveal’s proactive, user-centric protection along with the organization’s needs.
When a policy breach triggers a response action, Reveal can provide real-time feedback to educate users. It can also prevent unauthorized behavior and block threats, if necessary.
Various response actions range from displaying a popup message, redirecting the user to a sanctioned tool or application, or even providing guidance, documentation, or, most importantly, cyber security training. All of the above offer an educational opportunity to curb future events and stop those currently in progress.