Anomalous activity detection
As each user in your organisation accesses files during the day they establish a baseline of activity. Over time this baseline becomes representative of normal behaviour. By checking for anomalies to this pattern using a neural network and integrating activities across devices, monitoring access to sensitive data, and interfacing to network elements such as firewalls we are able to build a big picture view of activity across your organisation.
Our neural networks discover anomalies representing possible failures, attacks or malicious attempts to leak your data in real time. You can configure the platform to log, alert or even intervene and block these attempts. Specific events such as sensitive file modifications are tracked and can be pushed to your central logging or monitoring system.
No other platform combines this integrated view of events across so many elements of your infrastructure based on detailed knowledge of your unstructured data in this way.