Analyzing security threats

Logs can be captured from various hardware and software components including business applications and analyzed for security threats by comparing with past datasets. According to various analyses conducted, different mechanisms of authentication (for example) can be done. Say, for example, we can step up authentication (two-factor); The request is coming from Nigeria repeatedly within a span of few minutes to be stepped up or altogether blocked for being reviewed by a human and then for authorizing the transaction.