The energy sector and public utilities have historically faced threats from hackers, environmental activists, and individuals engaging in industrial and state espionage. As a result, security has become a top priority for these industries.
However, criminals are now exploiting employees of these organizations to gain access to information and management systems, using methods such as social engineering, data manipulation, bribery, and collusion. As insiders, these employees already have access to critical systems and can cause much more damage than outsiders.
The energy sector often utilizes outsourcing partners to address many issues. Contractors need to exchange confidential information with clients. This data must be reliably protected.
OctoWatch is a comprehensive solution for energy and public utility enterprises, combining the functions of detecting internal threats (insiders), preventing data leaks (DLP), and user activity monitoring capabilities.
Here are just a few examples of the benefits that an energy company can gain by implementing OctoWatch:
You will gain insights into what specific users are doing when connecting to critical systems, including servers, terminals, and remote control points.
By configuring an intelligent user activity analysis system, you can prevent the theft of valuable intellectual property such as testing data, geological exploration results, maps, plans, etc.
Limit the capabilities of privileged users, e.g., escalating access rights, executing potentially malicious software, etc.
Protect information on clients, contractors, accounting records, and other confidential data.
The OctoWatch software was installed on the work computers of employees at a major energy company in Kazakhstan after an anonymous employee published several materials marked as confidential, including financial indicators, salary levels of executives, and parts of confidential correspondence between employees.
The management required the security department to find those responsible for the leak.
As a result, the OctoWatch program was installed on all computers in the company.
The use of the software allowed the security department to conduct enhanced monitoring of all operations performed by users on corporate computers, but those responsible for the information leak did not reveal themselves for a long time.
Subsequently, another leak of information similar to the aforementioned occurred. Thanks to the presence of the OctoWatch software, it was possible to review user activity where key words were found in their correspondence. Emails, messages in messengers, and social media communications were monitored. During a more detailed analysis, it was established that the responsibility for the new data leak rested with employees who had been dismissed weeks prior to the emergence of the messages in the public information space.
The company’s management was advised of the need for continuous monitoring of employee activity to prevent similar situations in the future.