ResponSight comprises three key elements – the ResponSight Collector that gathers the metrics and telemetry; the ResponSight Aggregator that bundles and manages data delivery to 3rd party solutions and the ResponSight Cloud Service that does all of the heavy lifting and performs the analytics for enterprise risk profiling.
Metrics and Data
How is it Secured?
How is it Delivered?
Metrics and Data
What We Collect
ResponSight technology collects numerical, mathematical and statistical data about how the endpoint is used. By combining large volumes of raw numerical telemetry and selected metrics, it’s possible to build activity and behaviour profiles about users and their laptops, without ever knowing who that user is or what that laptop is.
ResponSight is always happy to show enterprises the raw data we collect – we’ll never hide behind any claims of “proprietary IP”, it’s your data and you’re welcome to see it (even if it is basically meaningless numbers to anyone but us!)
Why We're Different
- “big iron” technologies that require excessive access and trust inside organisations;
- solutions that collect too much “rich” data that may not even be reliable and often is not even required to achieve the desired outcome; and
- security and risk offerings that become the targets for attack themselves, as a direct result of the design decisions relating to the above
The ResponSight approach to security and risk is definitely harder – we’ve spent over 2 years just in R&D, building our IP. As a result, our approach and design is intended to ensure we’re not a vector for attack into the enterprise; that we won’t have any private or sensitive data stored on our systems that could be targeted for attack; and that ultimately we can profile enterprise risk as actionable intelligence for boards and executives to set useful priorities