e-StepControl – solution for identification of suspicious activities of IT syste

Presented by

Vitaly Zabiniako

About this talk

The presentation outlines main features of “e-StepControl” solution, its architecture and general approach which enable identification of suspicious activities of IT system users. Procedures for creation of individual / group user profiles are being provided based on the audit trails of user activities. Appropriate graph-based methods for monitoring and validating user sessions against these profiles are presented. This enables prevention of information theft and unauthorized use.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (109)
Subscribers (798)
DSS ITSEC in an annual, international and largest in the Baltic States cyber-security, data protection, privacy tech and business conference and expo from 2010, event annually brings together top ICT Security professionals from industry’s leading technology vendors, international organisations and agencies, local and regional businesses, as well as, representatives of government and public sector.