Searching for Access Anomalies in Clinical Audit Logs

Discovering patterns in audit logs that capture user access to sensitive data which help identify whether specific access are anomalous, and hence subject to further audit, or not.

Back to Top