Media Coverage

September 1, 2016

The Morning Risk Report: Defense Contractors Face New Insider Threat Rule

The Wall Street Journal

“‘This is a step in the right direction,’ said Mr. Ananthanpillai, as more stringent oversight has been discussed since the Edward Snowden data release of government secrets and the fatal 2013 shooting of 12 people at a U.S. Navy facility in Washington, D.C., which was done by a person who had a security clearance. The problem, said Mr. Ananthanpillai, was that a contractor didn’t have to do any checks on employees after they had secured an initial clearance, leaving a period of time–up to five or 10 years depending on the type of clearance one has–before another check was conducted. A worker with clearance could ‘do some serious damage’ during that time, he said. ‘It’s all about how to keep up with that.’ Contractors will be responsible for monitoring employees of any subcontractors they use if that subcontractor doesn’t have its own clearances.”

Read More

July 12, 2016

Healthcare organizations need to avoid the liability gap

HIT Leaders and News

“By bringing external public records together with internal data such as personal reviews and network activity, health care organizations can drastically reduce their exposure to insider threats and prevent incidents that drive clients to rival facilities. Periodic screens force managers to manually sift through outdated information, which fails to evolve. There have been too many examples of fraud, crimes and data breaches to believe the current screening process is working well. Healthcare organizations need a screening process that’s as dynamic as their personnel. The answer lies in continuous risk monitoring and a real-time risk status for every employee.”

Read More

June 28, 2016

People on the Move: Phil Usatine, Chief Technology Officer at IDentrix

Washington Business Journal

IDentrix, a leading provider of identity-based risk monitoring solutions, has named Usatine as chief technology officer. Usatine will spearhead development of the patented platform, which analyzes publicly-available data and alerts organizations about employee risk.

Read More

June 20, 2016

The Emergence of Infinity Screening

PI Magazine

We originated the term infinity screening in 2006 when the data base technology for being able to conduct on-going, continuous or reoccurring screening emerged. We saw the “hand writing on the wall” and that the dye had been cast for significant change to occur in the background screening industry. It has been a slow and arduous journey, but every year more and more firms are moving to conducting infinity screens.

Read More

May 9, 2016

Why Uber and Lyft aren’t looking to tech to solve their fingerprint problem

Los Angeles Times

“Ninety percent of companies do background checks and then forget about it,” Ananthanpillai said. “You want to be able to catch people proactively. So if a driver got arrested last night for a DUI, you want technology that will notify you right away, instead of waiting weeks for the government to update its database.”

Read More

March 30, 2016

The Emergence of Continuous Screening: Moving Background Screening From Pre-hire Problem Identification to a Threat Management Tool that Helps to Mitigate Risk

Pre-Employment Directory

Infinity screening is taking hold because employers are finally learning and understanding that pre-hire detection of problem behavior is not enough to forestall or foretell future bad behavior that creates risk for the organization. Its’ no surprise to any experienced business manager that at the core of risk and threats to businesses are the people they employ.

Read More

February 17, 2016

Here Are the Nominees for Tech Madness 2016

DC Inno

“Soon, we’ll be selecting 64 of the companies for the bracket, and seeding them based on factors including how much capital they’ve raised, product traction and business growth. … After that, it’ll be up to you to vote, based on which companies you think will have grown the most in five years’ time.”

Read More

January 15, 2016

3 Ways to Develop the Perfect DevOps Culture

In the seven years since the first “DevOps Day” took place in Europe, DevOps’ influence has spread to every corner of the world. Many organizations have embraced the concept, and it’s changed the way business is done. These companies have benefited from removing the gulf between development and operation teams—we have seen companies consistently churn out better software, in shorter time periods, to achieve new levels of efficiency.

Read More

January 5, 2016

How to Reduce Insider Threats with Continuous Risk Monitoring

Computer Technology Review

“Organizations must become proactive about identifying their insider threat risk by implementing continuous risk monitoring. Software and advanced data analytics now makes it possible to automate the process of analyzing public data in real-time so companies can actively monitor changes in risk throughout that individual’s tenure with the company.”

Read More

December 7, 2015

Sifting data to boost safety and security

Fleet Owner

“Yet it’s not just about protecting your company … It’s about getting the ability to get ahead of potential problems, such as a driver who gets two DUIs driving their personal vehicle. ‘These are the few ‘ticking time bombs’ a company really needs to worry about; not the vast majority of their workers’ … Something to think about as fears about home-grown terrorism are being rekindled anew.”

Read More
Follow Endera on: