How it works
Advanced technology that looks simple.
Real-time analysis and processing of logs
IDECSI ACCESS ANALYZER offers a powerful technology that fulfils IT requirements and is completely non-disruptive to existing information systems:
- Collects log data directly from all sources connected with the Email systems (MDM, BES, etc.)
- No need to add security restrictions to protected user’s account.
- No need for complex passwords, encryption certificates, USB keys or smart cards.
- Generates audit reports and/or sends alerts to selected individuals (authorized users, security personnel) with the origin and identity of the fraudulent access.
- Connects with SIEM (e.g. ArcSight, Splunk, NetIQ, etc. + Log Management: LogLogic, etc.)