Attachmate Corporation has introduced a new enterprise fraud management solution intended to take the guesswork out of application monitoring. The solution, Luminet, is designed to reveal user activity within enterprise applications and transform resulting data into actionable intelligence, enabling organizations to protect the privacy of mission-critical data, reduce internal fraud and ensure regulatory compliance.
Insider fraud and failed audits caused by employees abusing privileges and access to confidential information continues to be a growing challenge for many companies, observes Michael Miller, director of business development and strategy for Attachmate. Trusted users are the hardest to monitor since they need access for legitimate activities that they are authorized to do. And, Miller points out, it is not simply privileged users' malicious activities that can cause problems for organizations but also employees who are not following prescribed procedures.
Luminet helps fraud analysts and compliance auditors see all user activity in real time, record and visually play back application screens, and analyze suspicious patterns within a full-featured case management system. The system answers the question definitely of who is doing what, when and where, Miller explains. It captures a history of user activity across enterprise applications - from the mainframe to the Web.
Using passive network capture technology, Luminet captures all of the activity between the user and the enterprise application in real time. This enables fraud prevention and compliance teams to assemble a complete audit trail of user activity. The product also offers a Google-like search capability which enables analysts to search, retrieve, and replay each screen and keystroke.
Support for native application protocols enables fraud examiners and compliance auditors to zero in on anomalous behavior and visually replay end user activity, step by step. Customizable dashboards, reports and graphical link analysis tools enable users to analyze behavior patterns across application channels, by creating rules and alerts that respond to suspicious activity patterns in real time.
For more information, go here.