Keeper ZT has a classic approach to the «Rule Builder» feature in its inventory
User jobs are increasingly targeted by cybercriminals, according to analyst reports. It is through them that hackers gain access to the IT infrastructure of organizations.
The solution uses a variety of methods designed to track any marker of an attack, including non-malware attacks: lateral movement, suspicious behavior, and other signs.
Create rules by means of chains of actions, in which case you need to respond by prohibiting and sending notifications. Configure users and their PCs, enterprise departments, or all endpoints at once flexibly. In case of violation of such rules, it will be triggered and you will be notified by mail, and all actions will be automatically blocked.