Rule-Based Countermeasures for Suspicious User Activity

Rule-Based Countermeasures for Suspicious User Activity

The conduit between user access and protected data is a known target. This is where the StratoKey countermeasure engine comes into play. The countermeasure engine is a rules based engine where administrators can set what essentially amount to firewall rules. These rules can be benign such as IP range specifications, right through to responses to malware detections or improper user requests (such as administrator page requests).

Download this white paper to explore:

  • Four categories of countermeasures;
  • How chaining countermeasures can inject additional security;
  • Automated banning and account suspensions.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.