April 28, 2020

Dark Reading: When All Behavior Is Abnormal, How Do We Detect Anomalies?

Shahrokh Shahidzadeh, CEO at Acceptto says that looking past the login is critical.

"There are normal behaviors where some users use VPN, but that is not important," he says. "Besides the VPN login, there are other factors in play, such as the patterns gained through the analysis of the applicational behavior. What we are interested in is what happens throughout the life cycle of the session."

identity Access Management identity authentication stolen identity identity breach identity lifecycle