:back to venture 2005 page
:covelight: protect data
featured firm!

Covelight Systems, Inc. (Cary, NC) has developed solutions that protect critical financial, trade secret and entrusted personal data from abuse, misuse and fraud by web-application users. Covelight's patent-pending products deliver actionable intelligence in the form of real-time incident detection and notification, operational and security analytics and forensic audit trails to police an enterprise's web community and ensure its users are held accountable.


[ home ]
:sig interviews 2005 venture firms

on his "successtoday" program, famous business interviewer sig hutchinson talks with leaders from the 10 tech companies (menu listed at right) selected to present at the ced's 2005 venture event in pinehurst, nc.

the firms talk about their unique technologies, business strategies, and some of their plans for the future.

[ home ]
this venture 2005 series has been brought to you by these sponsors:
:the research triangle's tv station
:viewers in 75 countries and counting
:covelight: protect data
featured firm!

Covelight Systems, Inc. (Cary, NC) has developed solutions that protect critical financial, trade secret and entrusted personal data from abuse, misuse and fraud by web-application users. Covelight's patent-pending products deliver actionable intelligence in the form of real-time incident detection and notification, operational and security analytics and forensic audit trails to police an enterprise's web community and ensure its users are held accountable.


:back to venture 2005 page
Police Your Enterprise Web Community

Corporate financials, sales forecasts, entrusted customer data, operational reports and other trade secrets have been centralized in data centers and are now accessible to a large number of users via web-based technologies, subjecting them to abuse and misuse by the users of your mission-critical applications. This enterprise web user community consists of employees, trusted partners, suppliers and contractors all of whom have valid user credentials and are subjected to authorization schemes put in place to insure only the appropriate users have access to an organizations sensitive information assets.

While it is important to employ well-known control technologies such identity and access management to keep outsiders away from your critical assets, it is crucial to audit the insiders who, by design, must have access to your sensitive information to perform their jobs. Without proper auditing, in-depth analytics and supporting forensic evidence, organizations have no way of assessing the risk posed by these insiders, and no way to hold them accountable for violations of business and regulatory policies.

Covelight Percept - Usage Auditing, Analytics and Forensics

Percept, a new solution from Covelight Systems, allows you to police your enterprise web application user community by monitoring and recording the actions of your application users, providing real-time detection and notification of usage policy and control violations, all supported by detailed forensic data.

Percept delivers actionable intelligence to ensure your enterprise web community is in compliance with business use and security control policies; detects theft, fraud and abuse of critical web-enabled assets; delivers operational and security analytics; and holds your authenticated users accountable.