Case Study
Detecting Anomalies in Key Management Systems
Large scale enterprise networks often use enterprise key management (EKM) platforms for unified management of encryption keys. Monitoring access and usage patterns of EKM systems may enable detection of anomalous (possibly malicious) activity in the enterprise network not detectable by other means.