Read a description of Electronic Data Discovery Software. Free detailed reports on Electronic Data Discovery Software are also available.Electronic Discovery Best Practices Discovery Services Processing and review tools. Court Issues a Cornucopia of Sanctions for Discovery Violations Arrowhead Capital Fin. For the ediscovery community. Please contact us for your electronic data discovery needs at. Digital Mountain provides electronic discovery enabling law firms and in. These tools promise to investigate historical data to uncover security breaches, compliance failures and plain old errors in transactions across various enterprise systems, from network administration to accounting. Driven by compliance requirements such as Sarbanes- Oxley and the Health Insurance Portability and Accountability Act, these tools focus on user activities, such as who accessed a database or updated a customer account. The goal is to look at both real- time and historic patterns across multiple databases, networks and applications to find suspicious activities that might indicate insider financial fraud, customer identity theft, compliance policy breaches or theft of proprietary data such as customer contacts or product designs. As the senior security manager at Kimberly- Clark, which makes health and hygiene products, Osborne is interested in ways to prevent supplier or insider fraud, such as detecting sham providers used to steal or launder money. In other organizations, electronic data discovery tools might be used to detect identity theft or violations of information- access policies. Osborne is not alone in getting these pitches, say analysts and consultants, who warn that CIOs should be cautious. The Cost of eDiscovery. For example, Osborne is evaluating a tool from Oversight Systems that analyzes accounting information from SAP and other financial systems to detect fraud and errors both in current transactions and in past transactions stored in the SAP system. He’s recommended that Kimberly- Clark seriously consider adopting the technology. At online shopping service provider 2. Checkout. com, Tom Denman, the director of risk management, has adopted 4. Parameter’s analysis tools to detect fraud in the shopping and financial transactions that his service handles for online stores. Checkout used to rely on real- time security event monitoring tools but found they couldn’t do as thorough an analysis in real- time. Denman now batches customer transactions and uses 4. Parameter tools to analyze them against previous transactions and various fraud patterns, to detect stolen credit cards and the like (one fraud pattern might be the use of a credit card number for online purchases the same day in several countries). Suspect transactions get flagged for human review, prioritized by risk level. The use of historical data correlated across multiple systems and a focus on user activity is what distinguishes electronic data discovery from real- time security event monitoring (SEM) tools, which typically are used to monitor network activity for intrusions and viruses. The vendor trend is to merge the two functions into a suite, he adds. Source: http: //www.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |