SKYDEFENDED

Security Analytics

Process Mining for Security

En diseño
v0.1
Process MiningBehavioral AnalyticsTemporal AnalysisAPT DetectionLateral MovementInsider ThreatConformanceENSNIS2ISO 27001

Reconstructs behavior across time to expose attack patterns in progress, beyond static rules, sessions, and playbooks

El hueco que cerramos

Process Mining for Security is a SaaS platform that reconstructs identity-driven security processes as end-to-end flows, providing visibility into how access and actions actually occur across systems.

Traditional security tools such as SIEM, IAM or EDR focus on isolated events, alerts and logs. While effective at detecting known patterns, they often miss attacks that emerge from subtle deviations in behavior across multiple steps.

Process Mining for Security introduces a different approach.

Instead of analyzing events in isolation, the platform reconstructs complete identity processes, from authentication to final action, allowing organizations to understand the full sequence of interactions behind every access or operation.

How it works

The platform correlates events across systems and transforms them into structured process flows, enabling analysis of:

  • Authentication and session initiation
  • Token issuance and privilege changes
  • Access to applications and resources
  • Lateral movement patterns
  • Sequence and timing of actions

Detection model

Security is evaluated at the process level, not at the event level.

By understanding the expected structure of identity flows, the platform detects:

  • Deviations from normal process execution
  • Abnormal sequences of actions
  • Privilege escalation patterns
  • Suspicious chaining of legitimate operations

Positioning

Process Mining for Security acts as an intelligence layer above existing security controls such as SIEM, IAM and EDR, enhancing their capabilities without replacing them.

Outcome

The result is the ability to detect complex and low-noise attacks that traditional tools miss, shifting security from event-based detection to process-aware intelligence.

Compliance mapping

ENSRD 311/2022
op.acc.1op.acc.2op.acc.3op.acc.4op.acc.5op.mon.1op.mon.2op.mon.3mp.si.2mp.info.3
35%
NIS2EU 2022/2555 — Art. 21
Art.21.2.aArt.21.2.bArt.21.2.dArt.21.2.eArt.21.2.fArt.21.2.gArt.21.2.hArt.21.2.iArt.21.2.jArt.23Art.32
30%
ISO/IEC 27001:2022Annex A
A.5.15A.5.16A.5.17A.5.18A.5.19A.5.23A.5.25A.5.26A.8.3A.8.15A.8.16A.8.17A.8.34
35%
GDPREU 2016/679
Art.5.1.fArt.17Art.25Art.28Art.30Art.32Art.33Art.35
20%
PCI-DSS v4v4.0
Req.7Req.8Req.8.3.6Req.10Req.10.4Req.10.7Req.12.10
20%
DORAEU 2022/2554
Art.6Art.17Art.24Art.28Art.45
10%
SOC 2 Type IITrust Service Criteria
CC6.1CC6.2CC6.3CC6.6CC7.2CC7.3CC9.2
20%
CCN-STICCCN guides 803/806/815/884A
CCN-STIC-803CCN-STIC-806CCN-STIC-815CCN-STIC-884A
25%
MITRE ATT&CKv14 — Identity & Access
T1078T1110T1110.001T1110.003T1539T1548T1621T1530T1119
25%
ENS
35
NIS2
30
ISO/IEC 27001:2022
35
GDPR
20
PCI-DSS v4
20
DORA
10
SOC 2 Type II
20
CCN-STIC
25
MITRE ATT&CK
25

Hoja de ruta

01

Phase 0 — Foundation

DONE
02

Phase 1 — Admin + Tenant Frontend

abr 2026

IN PROGRESS
03

Phase 2 — Mining + Detection

jun 2026

IN PROGRESS
04

Phase 3 — ML, Auto-Response, Compliance

sept 2026

PLANNED
05

Phase 4 — Enterprise, MSSP, Marketplace

dic 2026

PLANNED

¿Listo para protegerte con Process Mining for Security?

Reconstructs behavior across time to expose attack patterns in progress, beyond static rules, sessions, and playbooks