Kron PAM’s UBA detects anomalous user behavior, such as irregular login time, unusual user activity or excessive access attempts based on the regular user patterns (baseline) of privileged users. Intelligent algorithms track potentially malicious activities and suspected compromised credentials, both in active and finished sessions, such as keyboard typing behavior and unusual command execution.
Kron PAM’s UBA detects imminent security threats related to privileged accounts. AI-based algorithms calculate user-based risk scores for the detected abnormal behavior and prioritize risks according to risk scores.
Advanced reporting features visualize suspicious and risky behavior and make it easy for system administrators to monitor user behavior.
Kron PAM’s UBA sends automated alerts to system administrators based on user risk scores. Kron PAM automatically responds to detected threats, such as terminating sessions or quarantining/restricting access to critical systems.