How to enforce real-time controls based on behavior risk scoring

Applying machine learning models against data sources in real time can differentiate customers and internal users based on behavioral attributes at a very granular level. When this output is used with an orchestration or workflow engine like an identity and access management platform for provisioning/deprovisioning, data loss prevention, cloud access security broker, etc., it can enforce an action such as prevent, allow, limit or monitor access in response to specific behavior patterns.

Read full article on Help Net Security

 


Date:

Categorie(s):

Tag(s):