What is Privileged Detection?

This topic describes Privileged Detection.

Introduction

Currently, many organizations cannot identify high-risk behavior, abuse of privileges, bypassing of privileged account security controls already in place, and any other anomalous activity performed by an organization's users at the earliest stages of the attack lifecycle – before systems are compromised and permanent damage has been done.

Security teams are not able to automate threat detection and risky behavior detection on sensitive systems during user activities. Although investments are made to have proper PAM controls put into place, there is still a lack of ability to detect bypassing attempts by attackers or even internal employees.

With ISI, organizations can now automatically detect and respond to privileged security events.

Privileged Detection types

The following Privileged Detection types are supported in Identity Security Intelligence:

  • Privileged Risky Activity

  • Suspected Credential Theft