Professional Documents
Culture Documents
ISHEILD monitors and collects suspicious activities on hosts and endpoint data
with rules-based automated response and analysis capabilities
which includes automation to identify and respond to threats based on RISK SCORE of
ISHEILD policies to determine the level of authentication
required for each access request like granting access, requiring an additional
authentication factor or blocking access as needed.
to do this we need to calculates an overall risk score per user, device and
resource, to respond to the threats and implement recommended authentication
policies.
as we get more data analysed ,through accurate risk scores will enable ISHEILD to
enforce effective
adaptive policies to maximize security while minimizing disruptions to the
workforce.
Monitor and collect activity data from endpoints that could indicate a threat
Analyze this data to identify threat patterns
Automatically respond to identified threats to remove or contain them, and
notify security personnel
Forensics and analysis tools to research identified threats and search for
suspicious activities