img
iTrace

Identity Risk Analytics
Platform

Identity analytics can be applied to various aspects of IAM including authentication, authorizatio user provisioning. It helps in Identifying anomalies in user behaviour, such as abnormal access attempts or accessing sensitive areas outside of the normal work hours. By analysing user identities, their access rights, and their behaviour, identity analytics can detect potential security threats, such as threats, phishing attacks, and compromised credentials.
iTrace Logo
Core Components
Core1
Core3
4 Wheeler Access Control
2 Wheeler Access Control
Identifying Threats
  • Top Risks (Access Denials, Door Held Open, Card Cloning, Temp Card Use, Access Outliers, Abnormal Hour Usage, Unused Cards, Tailgating, DoorForced Open, Unused-Card Use, Card Sharing, Data Anamolies, Unused Access, Impossible Travel/New Country)
  • Daily Risk Trend Analysis
  • Risk Share Analysis
  • Occupancy Analysis
  • Data Anamolies
  • Data Completion Score
  • Duplicate Accounts (Multiple Card Issued)
Identifying_Threats
  • Top Risks (Access Denials, Door Held Open, Card Cloning, Temp Card Use, Access Outliers, Abnormal Hour Usage, Unused Cards, Tailgating, DoorForced Open, Unused-Card Use, Card Sharing, Data Anamolies, Unused Access, Impossible Travel/New Country)
  • Daily Risk Trend Analysis
  • Risk Share Analysis
  • Occupancy Analysis
  • Data Anamolies
  • Data Completion Score
  • Duplicate Accounts (Multiple Card Issued)
Risk Analysis
  • Access Denials
  • Door Held Open
  • Card Cloning
  • Temp Card Use
  • Access Outliers
  • Abnormal Hour Usage
  • Unused Cards
  • Tailgating
  • Door Forced Open
  • Unused-Card Use
  • Card Sharing
  • Data Anomalies
  • Unused Access
  • Impossible Travel/New Country
  • Risk Trend Analysis
  • Risk wise Associated Identities
  • Risk Share by Department
  • Organisation & Location wise Risk Analysis
Risk_Analysis
Occupancy Analysis
Occupancy_Analysis
  • Average Occupancy across organisation
  • Location wise Occupancy & availability
  • Peak Occupancy in a Month
  • Lowest Occupancy in a Month
  • Location Wise Occupancy Trend
  • Department Wise Occupancy
  • Department wise Availability Vs Occupancy
  • Female Occupancy monitoring Outside Hours
  • Location wise Male Vs Female Occupancy
  • Location wise Occupancy by Type (Employee, Visitors, Contractors)
Employee Risk Score
EmployeeRiskScore
Benefits
Benefits
Application & Use Cases
Application & Use Cases
  • Access Control Enhancement

    - Using identity analytics to fortify access control measures, restricting unauthorized entry.

  • Insider Threat Mitigation

    - Identifying anomalies in employee behavior to mitigate potential insider threats.

  • Forensic Investigations

    - Utilizing historic identity data for post-incident forensic analysis.

iSecure IA (Identity Analytics) Platform
  • Dashboard Monitoring & Reporting
  • Risk Assessment
  • Risk Share & Trends
  • Data Anomalies & duplicate accounts
  • Configurable Risk Analysis Parameters
  • Risk Decomposition
  • Occupancy Monitoring
  • Employee wise Swipe analysis & Risk Score