IDECSI

Stand Number C79

Do you know if someone is spying on your executives’ email right now? Do you know who has accessed your SharePoint, your Dropbox, or other applications? Nearly 100 major companies, including 20 of the Fortune 500, rely on IDECSI to answer these questions. This unique solution monitors all access to protected resources and all configuration changes. Using profiles developed through machine learning, behaviour analysis, IP geo-position, the accessing device, and more, IDECSI automatically identifies illegitimate access and malicious configuration and alerts the user (as well as your security team and SIEM – as required). The user is the one person who knows who should be accessing their email. They are the one person who knows who should have permissions to their shared libraries. With user‑centric alerts, and no false positives, the user becomes part of your security team.