A team of six administrators is at an offsite and accidentally leave their laptops in an unlocked meeting space —when they return the next morning, the laptops are gone. Now each device is a potential vector for unauthorized access to patient data.
Protenus can’t stop a laptop from leaving a building, but it can help you determine all of the data viewed by that laptop’s user, and what information might now be at risk. It also helps you determine if the user’s behavior changed before the event, in order to determine if there might be more to the case than absentmindedness.
Tracing the access footprints of each device is critical. Forensic tracking to determine every branch of unauthorized access helps teams turn potential catastrophes into minor setbacks.
Deep User Understanding
Rather than simple rules, understand the unique characteristics that define each user’s daily activity, from how they work, to what they do, to whom they work with, to the type of patients that they see regularly. This allows you to gain insight into the factors that might have led your team member to lose that laptop, and understand precisely what data is now at risk.
Rapid Visual Forensics
With a lost device, minutes matter—get to the heart of the problem with rich visualizations that help you crack the case in minutes, not days or weeks.
Source of Truth Reporting
Rapidly view the complete picture of a user’s access to identify threats to patient privacy in the wake of a lost device.