Detect Anomalous Activity Ahead of a Data Breach With Heuristics
No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are there multiple login attempts from that location? If a financial analyst has never sent a file larger than 10MB, then why is he suddenly transferring 5GB zipped files to an unknown recipient? Any activity that doesn’t fit normal, everyday workflows likely indicates a potential breach or attack. You must develop heuristics to detect this anomalous activity and build a holistic, proactive defense that spans the entire third party workflow threat surface.
Third party workflow threats have a common theme: a user is the actor, and a file is the agent. Complete protection requires a defense that spans the full breadth of the associated threat surface: the collective paths of all files entering and exiting your organization. A comprehensive defense entails securing, monitoring, and managing all third party workflows, including secure email, SFTP, and secure file sharing, among others.
None at Present
4 年Heuristics to detect anomalous activities and a holistic, proactive defence for structured data business content workflows, merits further investigation in these extraordinary times