Computer software for data auditing and protection purposes, namely, logging and auditing accesses and alterations to sensitive data contained in databases, fileservers and application servers and detecting anomalous behavior, such as patterns indicating identity theft, in real-time
Electrical and Scientific Apparatus