SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

ICE CONSULTING PRODUCTS & SERVICES

» Start this Course
(Practice similar questions for free)
Question:

Real-Time Analysis of Behavior Related Incident SCENARIO: Three times a day on-average John logs into a file share containing critical business data. Then one day, he logs in 100 times… anomaly detected. His credentials were stolen, and he has been personally compromised.

Author: James Williams



Answer:

SOLUTION: Using artificial intelligence (AI) and machine learning technology, Securonix establishes a baseline of normal behavior, and compares that baseline to current activity on the network. It triggers an alert when it detects activity outside the norm. The ICE SOC Team opens the alert, contacts your IT Dept, and initiates action based on your Threat Response Plan. RESULT: Threat mitigated before your company loses the sensitive data core to your business.


0 / 5  (0 ratings)

1 answer(s) in total