e-StepControl – solution for identification of suspicious activities of IT syste
The presentation outlines main features of
“e-StepControl” solution, its architecture and general approach which enable identification of suspicious activities of IT system users. Procedures for creation of individual / group user profiles are being provided based on the audit trails of user activities. Appropriate graph-based methods for monitoring and validating user sessions against these profiles are presented. This enables prevention of information theft and unauthorized use.
RecordedNov 25 201628 mins
Your place is confirmed, we'll send you email reminders
DSS ITSEC in an annual, international and largest in the Baltic States cyber-security, data protection, privacy tech and business conference and expo from 2010, event annually brings together top ICT Security professionals from industry’s leading technology vendors, international organisations and agencies, local and regional businesses, as well as, representatives of government and public sector.