{"componentChunkName":"component---src-pages-markdown-remark-fields-slug-js","path":"/identity/loginradius-consumer-audit-trail-data-analysis/","result":{"data":{"markdownRemark":{"id":"e6ded411-4e50-5c16-a478-b261e61b511d","excerpt":"There is a constant need for compliance and security in every industry that uses customer identities for tracking records, transactions, or any other activity…","html":"<p>There is a constant need for compliance and security in every industry that uses customer identities for tracking records, transactions, or any other activity. As such the advantages of audit trails are multidimensional - from generating historical reports, crime investigation, future budget planning, audit compliance, risk management, and many more.</p>\n<p>The LoginRadius’ recently announced Consumer Audit Trail detects threats in real-time, manages incident response, and if need be, even performs a forensic investigation on past security incidents. It also turns log entries, and events from security systems, into actionable information.</p>\n<p>Additionally, it prepares audits for compliance purposes, provides the functionality to track user engagement, and gain an in-depth understanding of customer behavioral metrics.</p>\n<h2 id=\"intent-behind-the-launch\" style=\"position:relative;\"><a href=\"#intent-behind-the-launch\" aria-label=\"intent behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intent Behind the Launch</h2>\n<p>The ability to track back records to their source comes with a lot of benefits. Transparency, compliance, accountability, and security of sensitive information are a few of them.</p>\n<p>Through real-time monitoring, businesses can automate audit logs and use them to identify unusual activities or operational issues. </p>\n<p>In addition, audit logs can be used to gain deeper insights into an identity cloud environment. This information improves the application's performance and maintainability and automates actions that otherwise require manual intervention.</p>\n<h2 id=\"core-capabilities-of-loginradius-consumer-audit-trail\" style=\"position:relative;\"><a href=\"#core-capabilities-of-loginradius-consumer-audit-trail\" aria-label=\"core capabilities of loginradius consumer audit trail permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Core Capabilities of LoginRadius Consumer Audit Trail</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAMABQDASIAAhEBAxEB/8QAFwAAAwEAAAAAAAAAAAAAAAAAAAEDBf/EABYBAQEBAAAAAAAAAAAAAAAAAAIAAf/aAAwDAQACEAMQAAABctCaLKmX/8QAGhAAAgIDAAAAAAAAAAAAAAAAAQIAIgMRE//aAAgBAQABBQJkrjYseAjWZEAm5//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQMBAT8BP//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQIBAT8BP//EAB0QAAICAQUAAAAAAAAAAAAAAAABERICECExMkH/2gAIAQEABj8CcIWL3OxV8QW90//EAB0QAAIBBAMAAAAAAAAAAAAAAAABESExQWFRgZH/2gAIAQEAAT8hWuEMtKNi7WhKgwVQVtyrC8P/2gAMAwEAAgADAAAAENP/AP/EABYRAQEBAAAAAAAAAAAAAAAAAAARAf/aAAgBAwEBPxCJj//EABYRAQEBAAAAAAAAAAAAAAAAAAARAf/aAAgBAgEBPxCrr//EAB4QAQEAAgEFAQAAAAAAAAAAAAERACFBMVFhcYHh/9oACAEBAAE/EFWmm2rTg/McTeFWDvfGbLZViFybQVDjNii3XvF9T/Gf/9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Core Capabilities of LoginRadius Consumer Audit Trail\"\n        title=\"Core Capabilities of LoginRadius Consumer Audit Trail\"\n        src=\"/static/64fe103f2211d175424ff037f1385bd0/212bf/Core-Capabilities-of-LoginRadius-Consumer-Audit-Trail.jpg\"\n        srcset=\"/static/64fe103f2211d175424ff037f1385bd0/6aca1/Core-Capabilities-of-LoginRadius-Consumer-Audit-Trail.jpg 650w,\n/static/64fe103f2211d175424ff037f1385bd0/212bf/Core-Capabilities-of-LoginRadius-Consumer-Audit-Trail.jpg 768w,\n/static/64fe103f2211d175424ff037f1385bd0/72e01/Core-Capabilities-of-LoginRadius-Consumer-Audit-Trail.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li><strong>Data Collection</strong>: The LoginRadius Data Management Platform gathers data from various sources, APIs, and even from migrated data to enrich the user profile data. </li>\n<li><strong>Secure Data Management</strong>: It offers end-to-end encryption at rest and in transit and ensures <a href=\"https://www.loginradius.com/data-governance/\">data collection within the compliance</a> boundaries of social networks and website privacy policy terms.</li>\n<li><strong>Data Categorization</strong>: It categorizes APIs as create, read, update, delete (CRUD) to manage all rules, properties, and events.</li>\n<li><strong>Data Versioning</strong>: It produces gigabytes of log data every day, and every change made to the user profile is stored/versioned and used for auditing purposes.</li>\n<li><strong>Data Filtration for Identified Data Point</strong>: The consumer audit trail filter the activities of a user based on identified data points like ID, UID, apple ID, CRUD operations on user profile, date, time, region, IP, database, user agent, host and many more.</li>\n<li><strong>Log Retention</strong>: The parsed data is stored for further analysis for a default retention policy, which is the last 30 days. </li>\n<li><strong>Real-Time Alerting</strong>: It offers alert notification supported via email, dashboard, webhook, and other inbuilt integrations.</li>\n<li><strong>Incident Response</strong>: It provides case management, collaboration, and knowledge sharing around security incidents. </li>\n<li><strong>SIEM Complete Solution Analytics</strong>: LoginRadius offers its SIEM solution via integration to showcase the analytical details for business decisions. It supports integrations with most-used tools like Splunk, logstash, sumo logic, etc.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-consumer-audit-trail/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Consumer audit trail datasheet\"\n        title=\"Consumer audit trail datasheet\"\n        src=\"/static/2d22772fa230a7fc3d196f16f605e8be/212bf/DS-Cosumer-Audit-Trail-1024x310.jpg\"\n        srcset=\"/static/2d22772fa230a7fc3d196f16f605e8be/6aca1/DS-Cosumer-Audit-Trail-1024x310.jpg 650w,\n/static/2d22772fa230a7fc3d196f16f605e8be/212bf/DS-Cosumer-Audit-Trail-1024x310.jpg 768w,\n/static/2d22772fa230a7fc3d196f16f605e8be/72e01/DS-Cosumer-Audit-Trail-1024x310.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>The world that we live in today falls under several regulatory laws - be it <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">the EU's GDPR, California's CCPA</a>, or any other international statutes. It is a good practice to maintain a reliable and accurate audit log and trail system.</p>\n<p>The LoginRadius' Consumer AuditTrail feature plays a vital role in the maintenance, security, availability, and integrity of the records so businesses can understand the <a href=\"https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/\">bigger picture in the cybersecurity threat</a> landscape.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABbElEQVQY0zVQO0/CUBQmaihthUbRhPhCAlhKEXlE3s+CCEaBwQF10riQODkwaFyMMcTFwR9gjBvRSeKko4NxcfD/fJ57C8PJbc53+r0soj8Lm5qHbS0HW6AIwZ+DXSvAESxBpJ3MMLph3+xWDlUwm2jCGa5A0isQtRIkhrH/CbdwwkDBHAJlGodexsy6wUkduknMBCfdmxCCBhZKHailfUxGm5jQKphaTUDwmaIWdigyF1oZsm7AFavBRspKuMpdTJMQO5yLbCHVPkG0cYRY4xAR9tbp3T5AsnUMT7YFqzdtOuQOSFmiyMupXUihKuzk0hWvc0xgUYlYod18tAZPrg13eg8rNIuJHSihMtVUHEUe51cLPJ5zo8oJJRJQRnHlQB6WpTjOru7w/fuH59d3PL0M8Th4w+fXDwbDD16R1ZsxCcelsyUbidQEEuC9ECap1J8nCaPTRe/2Ad3LvjkXfZxf3+O0d8P7FnwZ/AMzEsMp2f6LdQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","headings":[{"value":"Intent Behind the Launch","depth":2},{"value":"Core Capabilities of LoginRadius Consumer Audit Trail","depth":2},{"value":"A Final Word","depth":2}],"fields":{"slug":"/identity/loginradius-consumer-audit-trail-data-analysis/"},"frontmatter":{"metatitle":"LoginRadius Consumer Audit Trail For Risk Assessment | LoginRadius","metadescription":"Consumer Audit Trail by LoginRadius tracks threats in real-time handles incident response and even conducts forensic analysis on past security incidents.","description":"The recently released Consumer Audit Trail by LoginRadius tracks threats in real time, handles incident response, and even conducts a forensic analysis on past security incidents, if necessary.","title":"LoginRadius Approves Consumer Audit Trail for In-Depth Data Analysis and Risk Assessment","canonical":null,"date":"July 02, 2020","updated_date":null,"tags":["industry-news"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/630b48719d163e895ae90a3ef26eeec4/701ee/Consumer-Audit-Trail.jpg","srcSet":"/static/630b48719d163e895ae90a3ef26eeec4/3dcee/Consumer-Audit-Trail.jpg 200w,\n/static/630b48719d163e895ae90a3ef26eeec4/ae6ae/Consumer-Audit-Trail.jpg 400w,\n/static/630b48719d163e895ae90a3ef26eeec4/701ee/Consumer-Audit-Trail.jpg 800w,\n/static/630b48719d163e895ae90a3ef26eeec4/b2bf6/Consumer-Audit-Trail.jpg 1026w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","bio":"Entrepreneur by Work. Artist by ❤️. Engineer by Trade. Human Being. Feminist. Proud Indian. CEO/Founder at LoginRadius, securing 1B+ IDs worldwide.","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"id":"e6ded411-4e50-5c16-a478-b261e61b511d","fields__slug":"/identity/loginradius-consumer-audit-trail-data-analysis/","__params":{"fields__slug":"identity"}}},"staticQueryHashes":["1171199041","1384082988","1711371485","1753898100","2100481360","229320306","23180105","528864852"]}