Theoretical approach
Operation of an organization – even it’s a financial, production or governance – is working under regulations and policies. These rules can be law enforcements, industrial standards, quality standards, standard operation procedures etc., which frames a control environment all together and impacts (enforces) the conformity of the functional processes. In this environment operational risks can be defined, which threaten the business activity, and may get the realization of the organization’s goals doubtful.
Prioritized risks are connectable with the affected operational processes, and the process steps inside. The work of the process executives is supported or supervised by information systems in every single process steps. The usage of these IT functions leaves several digital tracks in the whole IT infrastructure. Those can be for example the operative data, the system logs of the operations, and the status logs of the infrastructure elements.
To get a possible full picture about the operation of the critical processes, we used a novel approach, and mapped the digital tracks of the relevant events of diverse systems in one common event space, which we called IT Event Space.
With proper work up it is possible to develop a solid monitoring system, which traces the critical processes, forecasts the weaknesses of the operation, reveal the hidden correlations, and sends warnings about the unwanted events. This system can point out to the risks belonging to the functional processes; to the deviations from requirements raised by the control environment; and to the possible loss sources in many ways.
Basic conception of the I4Log
I4Log is able to process not only the logs coming from the IT systems, but all the other data, which can reliable track and re-enact all the steps of a given functional process. In accordance with our conception we imply in the category of the digital track - beyond the standard log entries - the operative data of the business applications and the system logs of these operations, moreover the uniquely composed – occasional manually created – complementary data.
I4Log track analyzing system can do near real-time and follow-up type log entry analysis as well. Thanks to the data-warehouse conception and the applied artificial intelligence solutions, the strength of the I4Log is the follow-up type analysis and the predictions.
One of our innovation goals was that the track analyzing system should be applicable in several business areas, to increase the competitiveness of the customer and parallel this, with the usage of I4Log the customer can keep the security of it’s information assets and it’s good reputation and fame. You can use our digital-track-analysis-based loss reduction solution for the following purpose:
- automatic monitor of the critical events,
- IT/HR risk mitigation,
- HR risk level measurable,
- support the compliance audit,
- explore the misuse and fraud,
- forecast the operational anomalies,
- supervise and control the usage of the information systems,
- make the operation of the company and the user activities more transparent etc.
I4Log can show how the organization complies with the expected operation, the external conformances (law, standards, regulations, etc.), or the internal policies (ISO, SOPs, etc.). It supports the continuous monitoring and the temporary audit tasks as well. Observing, and revealing the functional anomalies, I4Log backs the company management to discover the bad practice cases in time, to be able to take steps for safeguarding the efficiency, the authenticity and the prosperity of the company.
I4Log has built up on modular basis. The main functions are represented by separate system components, which can be deployed to separate physical and logical places (separate location, server, operation system, etc.) if needed. The other advantage of the modularity is that the system can be flexibly adapted with the existing information security solutions either on the input or the output side.
Logical structure of I4Log
The system contains four functional levels. These levels are able to work independently too, and can be adapted to other information security systems as well.
