Professional Documents
Culture Documents
investigations
USE CASES
• Top suspicious email IP’s - Knowledge of the top IP’s from where the
suspicious emails are routed is crucial to the organization. This report will
provide list of IP address from where suspicious email have come. These IP’s
can be blocked so no further users will be subject to these mails.
• Top Suspicious Users - This would show the top suspicious user accounts from where
suspicious mail activities is happening. Organization can have better watch on such mail
accounts and can be blocked, so no such activities will happen in future from those
accounts. The report can show all such events and will give detailed insight on such
events and we can alter the rules to enhance the security.
• Activities bifurcation by role - All the activities can be divided by the role of the
user doing it. This will give much needed insight to the security analyzer for the activities
performed by the user and they can see what all activities are done by Privileged users,
contracted users and non privileged users. Will be able to find out occurrences where
users are not authorized for any activity and if they are doing so, can be traces here and
system can be enhance to restrict such occurrence in future.
VISIBILITY
• The system provides trend of events happening over a period of time which
would help the system analyst to understand the behavior of such events and can
predict the trends of such occurrence. This would prove very helpful in finding
or investigating critical system issues.
ABOUT LTS SECURE
LTS Secure offers a Security Suite to rationalize,
prioritize & automate response to risks in your
environment. Comprehensive Cyber Security Solutions
with continuous monitoring at all layers of the IT stack:
network packets, flows, OS activities, content, user
behaviors and application transactions.
To know more about LTS SECURE, contact us at
enquiry@leosys.net or call us at 800-689-4506
Visit us at http://ltssecure.com