# Emanate Security Product Docs

## Platform Overview

<figure><img src="https://3641401651-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrtKYoMupmW42dDaQn6Rd%2Fuploads%2FruuZvCulimaUvSZeusij%2FPlatform1.png?alt=media&#x26;token=9272d543-d797-411f-8bad-984d2172935c" alt=""><figcaption></figcaption></figure>

## Benefits

The Emanate Security Platform (ESP) works by ingesting user activity logs from your existing cloud productivity and security solutions. By parsing, normalizing, and analyzing these activity logs, user-specific detections are triggered in real-time (as soon as we get the logs). These events are actioned immediately, enhancing a user-specific timeline analysis and contextualizing insider threat, account compromise, and non-compliant behavior by automatically contacting employees and their managers for additional context where necessary.

ESP is used to create user-specific security guardrails, allowing an organization to take advantage of the granular, user-specific controls that point solutions offer, but are rarely used. To secure user behavior at scale, ESP provides the following benefits:

* **Streamline Investigations** with user behavior timelines and risk analyses that automatically contact users & managers when business context is needed.
* **Tighten Security Controls** by leveraging behavioral analysis anomaly detection coupled with user and manager context, enabling strict controls to reduce attack tree scenarios.
* **Eliminate User Friction** by offering users with proactive exception requests or secure alternatives every time a control gets in the way of their productivity.
* **Reduction in False Positives** with alerts that are finely tuned to every individual, reducing unnecessary investigations associated with company or team-wide generic detections.
* **Hands-Free Compliance Attestations** allow organizations to capture information on non-compliant behaviors and user actions at scale.

## Features

Key features of the Emanate Security Platform include:

* **Quick and Simple Integrations:** Each 3rd party integration is wizard driven and takes minutes to set up.
* **Real-Time Event Detections:** ESP's user behavior detections are processed in sub-second timeframes once logs are received.
* **Automated User Context Gathering:** When necessary, detections are automatically messaged to users and/or managers in near real-time, with typical responses in minutes.
* **User Timeline Analyses & Risk Reports:** Each user record comes with a comprehensive timeline of events, supplemented with user context making investigations quick and easy.
* **User-Specific Guardrails:** Every ESP detection is automatically tuned to optimize for expected and unexpected behavior, reducing the false positives associated with generic detections.
* **Downstream Automation:** The user-focused nature of ESP detections, including user & manager context enable a fully-automated response solution you can rely on.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.emanatesecurity.com/emanate-security-product-docs.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
