As part of an effort to make it simpler to identify illicit activities such as fraud, Hewlett-Packard Enterprise (HPE) unfurled today a hosted service that combines archiving, compliance, software and machine learning to automatically detect patterns and anomalies in structured and unstructured data.
Robert Patrick, director of product management for Big Data Advanced Analytics at HPE, says HPE Investigative Analytics, launched at the LegalTech 2016 conference, is specifically designed to reduce the number of false positives that other approaches to compliance typically generate. In fact, Patrick notes that the rate at which those false positives are generated by legacy approaches to compliance is one of the primary reasons such offerings have not thus far been widely deployed. While the risks associated with violating compliance regulations may be high, Patrick says most organizations can’t afford the paralysis associated with tracking down every alert generated about a potential infraction.https://o1.qnsr.com/log/p.gif?;n=203;c=204663295;s=11915;x=7936;f=201904081034270;u=j;z=TIMESTAMP;a=20410779;e=iIn contrast, Patrick says HPE Investigative Analytics first combs through historical data to determine what processes and conversations represent normal business as usual. It then only flags behavior that is anomalous to patterns that have been well-defined. Patrick says the end result is an approach to mitigating risks that is much more in tune with how the business actually functions.
Patrick also notes that HPE Investigative Analytics represents a derivative from the investments Hewlett-Packard made over the years in acquiring technologies such as columnar databases developed by Vertica and the Intelligent Data Operating Layer (IDOL) platform built by Autonomy. Combining those assets with archiving and security software developed by HP is enabling HPE to deliver a new hosted compliance service, says Patrick.
While no technology is ever going to prevent morally compromised people from bending the rules, the fact that they will soon realize that the technology being used to uncover their schemes is getting more sophisticated should act as a significant deterrence. The only issue facing IT organizations is finding a way to accomplish that goal that is worth more than the trouble it causes.