Insider Threat Management
Based on industry-leading technologies of statistical analysis, Bi-directional Recurrent Neural Network (BRNN), big data analysis and Bayesian network, ITM collects user behavior characteristics and builds user behavior models to evaluate insider risks and anomalies. The generated final Threat Risk Score (TRS) is then integrated with UCS policies to realize intelligent, real-time supervision and control on risky insiders.