The dispersive cloud has three core use cases, monitor, analysis, and report. For the management of account information, the dispersive cloud also develops use cases for login/log out and account management.
This is a short overview of our major use cases.
When an outsider uses the employee account to login into the company website,
Our biometric algorithm can identify and record the outsider's information as a threat.
Security analysts can check threat details or download the report of threats for further investigation.
There are all of our features.
For collecting the mouse movement data for real-time analysis, the dispersive cloud simulates a standard work environment to collect user mouse movement information. In our user pool at Cognito, there is previous information for current employees. Employee can create an account with their email address.
When a new employee signs in to their account with their email, their information will dynamically record in our user pool.
The standard work environment.
All employees’ information will store in the cloud database. When a new employee login into the company website, our system will build an employee personal biometrics behavior profile based on their unique mouse movement.
Normally, it takes a strand workday to collect the mouse movement to generate a biometrics profile. For this demonstration, we shortened the profile generation process into only 5 actions. As you can see, when an employee uses the company website, their mouse movement will automatically cover into three biometrics parameters, angle of curvature, curvature distance and the direction of movement, with the time and IP address of the threat.
The recorded information will automatically compare with the distribution of previous biometrics behavior data to identify the account leak threat.
The standard work environment.
When the tier1 security analyst login into the dashboard of the security system.
The analyst can check all alerts that generate by our dynamic cloud database.
The analyst can investigate on the alert details.
In the alert details, the analyst will have an overview of the status of abnormal behavior and distribution of historical biometric behavior by our three biometrics parameters.
Analysts also can investigate on each parameter for further details.
Dispersive cloud develops a reporting system for the tier1 analyst to generate the report to the security manager about the performance by using our security system.
The analyst can check and download the threats detected on different platforms with multiple periods: the historical overview, daily, weekly, and monthly reports.
In the user manage selection, the analyst can add or delete the monitored employee account.
Once the employee account is removed from user manage selection, its corresponding alerts will also delete from the dashboard.