Detect anomaly in using inside company information by analyzing scenarios and patterns based on big data
Create, query, process various types of inside information, including personal information, sales confidentiality, property assets, and monitor their activity. Detect abnormal symptoms based on scenarios, use visualization tools to analyze correlation in the use of information intuitively.
Identify and manage high-risk groups for data and users, detect and respond to abnormal symptoms preemptively. Risk index is pre-defined to protect inside information, also inspection is held for weak points regularly.
Collect structure and unstructured data in many systems such as security solution events, portals’ logs, groupware logs, thus integrating and storing them.
Extract factors of users, information, behaviors from collected logs and analyze their correlation between heterogeneous logs, and detect a symptom of overusing inside information such as access for non-business purpose, excessive query, and etc.
Define various risk indicators including the level of inside information, display of critical information exposure, threshold in the number of query and the index of count risk per division and user regularly, thus preventing security incidents related to overuse of inside information.
Collect employees’ access packets and logs to have an access to screens with customer information included, thus detecting an excess or normal range of query.