In today's distributed environment, where fuzzy boundaries are the norm, it is more important than ever to monitor who is accessing what and from where.
Once monitoring controls are in place, the next challenge is to collate all the data collected and perform analysis on it, to reduce noise, and identify anomalous patterns that require further review. For example a user accessing a system regularly between 9:00 a.m and 5:00 p.m PST, suddenly attempts to sign on at 3:00 a.m PST from an unregistered device and unrecognized location.
We offer services around automated security event collection, policy definition, risk analysis and proactive as well as reactive incident management.