LORIC™ ServiceNow Security
Security and Governance
Solution Brief for ServiceNow
LORIC is the first ServiceNow-certified cloud security solution.
Cloud services are a growing target and cloud security is a shared responsibility. Security of the cloud infrastructure is ServiceNow’s responsibility, while access and usage of the data stored in ServiceNow is the organization’s responsibility. Learn how the LORIC platform from Palerra enables security and governance for ServiceNow with visibility, threat detection, compliance management and incident response.
LORIC provides instant insights into adoption and usage of ServiceNow, such as users that resolved the most critical incidents.
LORIC provides the ability to create custom reports as well as a rich set of predefined reports on potentially risky activities such as granting administrator privileges to a user.
LORIC continuously monitors security configurations within ServiceNow to ensure compliance. Say goodbye to laborious manual audits.
Identify User Risks
LORIC uses machine learning to study activities such as logins, script changes, and administrative changes for each ServiceNow user to create baseline activity profiles. It flags deviations in behavior exposing insiders and hackers. Say goodbye to manual forensics.
Catch Policy Violations
LORIC provides the ability to build custom policies as well as a library of predefined policies for real-time notifications about activities that may introduce risks, such as granting administrator privileges to users.
Close Security Gaps
LORIC automatically logs incidents that occur. Address incidents immediately to close windows of opportunity.
LORIC integrates with LDAP, single sign-on, identity and access management, ticketing, and incident management solutions such as ServiceNow. Leverage your existing IT investments.
Get Started in Minutes
LORIC does not require hardware, software, or agents – get started in minutes by simply creating a ServiceNow service account.
“We are really looking to use LORIC to address some of the gaps in our security monitoring and
intelligence and visibility of users’ activity, potential threats, and bad actors in the cloud.”
Head of IAM, Architecture & Strategy Group