What Services do you Integrate with and why?
Unify Insights requires integrations with a number of your security and IT tools to provide your organization with a comprehensive picture of your Human Risk footprint.
📚 Overview
Unify Insights is a powerful analytics tool for your organization's use in tackling your Human Risk attack surface. By consuming events and identities from a number of your security and IT tools, your Cyber Security/IT teams can ensure that not only is your organization tackling human risk behaviors, it can also provide proactive trends overtime so you can measure if your training, communication and/or policy changes are effective.
🔌 What Services do you Integrate?
Unify Insights will need to pull identities and events from multiple categories in order to provide the comprehensive picture spoken about above. Living Security recommends a number of methods for establishing initial integrations and roadmapping future integrations so that through the life of your engagement with HRM Platform, you have the analytics and insights to truly empower your Human Risk solution. Our chief recommendation is to integrate based on key categories, which are listed below.
⚠️ Unify Insights has a few requirements in order for the tool to empower your organization's training, communication and policies. For a breakdown on why these requirements need to be met, you can discover how Unify works via our What is Unify? article. For a list of these requirements you may find them below:
- Source of Truth for Identities
- In order for Unify Insights to correctly resolve identities within your organization so that events can paint a clear picture, Unify will need to integrate with your established source of truth for identities.
- SaaS Only
- Unify Insights does not support integrations with on-premises tools and applications at this time. All integrations supported are Software-as-a-Service only.
- Minimum Three Integrations
- Unify Insights builds its analytics around Focal Points. In order for a Focal Point to provide a clear enough picture for your organization to rely on it, we recommend a minimum of three integrations be performed so that enough data can be normalized to show that comprehensive picture.
👤 Authentication, Access & Activity
Identity Management and Authentication tools can provide Authentication and Access events that speak to your company's policies around password and authentication requirements. Example events include Login Success, Account Lockout, and Credentials expired events of users within an environment to determine how individuals perform under an organization's authentication hygiene and policy adherence is being conducted.
Example Integrations: Azure Active Directory, Okta, LastPass, 1Password
🔒 Data Security & Privacy
Events such as access denial and data exfiltration monitoring pushed to Unify can inform an organization of when passive policies(such as least privilege policies) might be at risk or if excessive Data Security risks are being conducted.
Example Integrations: Code42
💻 Endpoint Security
Events such as malware risks or bulk data download can speak to the device security practices of individuals, departments or office locations within an organizations environment.
Example Integrations: Crowdstrike, Netskope, Sophos
✉️ Phishing & Email
Events such as receiving Phishing attempts, and clicking malicious links provide organizations a view into who in their organization is reporting or clicking on these events.
Example Integrations: Cofense PhishMe, KnowBe4 PhishER, Mimecast, Living Security Phishing
💪 Training
Events such as completion of training will give an organization the insight into how their users are becoming vigilant.
Example Integrations: Workday, Living Security Training Platform
🌐 Web Security
Events such as when an identity has attempted to access a blocked website, or when they access a malicious website will affect their overall human risk score.
Example Integrations: Microsoft O365 Defender, Mimecast, Sophos
🛠️Integration Guides
Living Security has written individual articles for each service we can connect too. These articles are based on the API documentation(that is linked in each guide) in a way that is a quick step-by-step.
For Living Security technologies (Training, Incident Response, Phishing) that are in use by customers, these integrations come standard/enabled for your Unify tenant.