Anomalous Logins
Anomalous logins may signify suspicious activity. This often includes logins of a user into computers they don't normally log into, logins outside of a routine pattern on certain days of the week, also by time of day, or logins into a particular workstation or server outside of a certain set of users.
Related Solution
AIS Managed SIEM
Explore our Solutions
AIS delivers a wide range of technology solutions, managed services, and consulting services that allow businesses to compete in today’s market. Whether deploying AIS solutions or other best-of-breed tools, the experienced, reliable AIS team delivers projects on time while streamlining IT services.

AIS Labs
AIS offers a variety of technology solutions leveraging enterprise open-source software, developed and maintained by AIS engineers. These include AIS Managed Firewall, NMS, SIEM, and VoIP.
Last modified
September 14, 2021