Xpandion Blog

  • Home
    Blog Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.

Could Xpandion Have Rescued Little Red Riding Hood?

  • Font size: Larger Smaller
  • Hits: 5627
  • Print

We could have changed history!

In the famous fairy tale, Little Red Riding Hood approaches “Grandma” who is actually the Big Bad Wolf in disguise. After the initial moment of meeting, she notices that something’s wrong and starts to question her – “What a deep voice you have!” “What big eyes you have!” and finally “What a big mouth you have!” – which is the last uncertainty before she finds her way into the Wolf’s stomach.


If Little Red Riding Hood had used ProfileTailor Dynamics from the get-go, she would have gotten alerted about her Grandmother’s irregular behavior and could have saved herself. Done deal. 

Let me prove how three strikes could have rapidly changed the story:

Strike #1: Behavior Based Profiling

Our software is centered around behavior based profiling. It learns each user’s behavior and compares it with the learned profile. So basically, when the Wolf first pretends to be Grandma, even before Little Red Riding Hood gets into the house, the system would have identified that the wrong person was posing as “user Grandma” and would have immediately sent alerts to the security guy, the Hunter. The Hunter would have gotten to Grandma’s house ahead of time and the story would have ended with less swallowing.

Strike #2: Comparison of Key Characteristics 

When Little Red Riding Hood asks the questions, at least by the second question, she could have identified that the characteristics were not OK. Creating a profile in our world means that we know what activities a person is doing, the IP address that he used to access the system, and more. In parallel, we’d know the details of Grandma’s real characteristics – the size of Grandma’s eyes and ears, the way she walks, the sound of her voice – so when the granddaughter asks her second question about the weird characteristics, an SMS would have sounded on her smartphone with the text “Alert! High Risk! This person does not seem to be Grandma!!!”

Strike #3: Good Workflow Performance 

And last but not least – when a user disappears from the system, (in this case, either Grandma or Little Red Riding Hood, as both were swallowed by the Wolf), the Hunter would have saved them, not just because he coincidentally had been walking by the house – but because he was alerted about a suspicious event of user elimination. In other words, the monitoring system should always check when a user is eliminated if a standard workflow has been conducted and approved beforehand. Users who “disappear” without a “leaving employee” workflow are suspicious. A good workflow will identify that the HR record of an employee was updated for “permanent leave” and will take care of closing all of his user accounts in all systems. A sudden termination of a username should create and send an alert to the Hunter immediately, for further action.

The Moral of the Story

So should Little Red Riding Hood have used ProfileTailor Dynamics? For her own sake she definitely should have, but for the sake of the story – well, considering the amount of security breaches that have been eliminated or stopped by ProfileTailor Dynamics up to today, there would be no story to tell our children. 

…But yeah, don’t talk to strangers.

What other fairy tale can you think of that could have been solved using irregular-behavior identification? Share it with us, below.

You might also be interested in reading “Do you Understand the Meaning of Behavior Based Profiling? ” 

Xpandion is the leading provider of Authorizations software solutions for ERP. If you have any questions or concerns about your authorizations, contact us now.


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest 24/06/2017


in XpandionPosted by Yoav Michaeli

Optimize Licensing Costs. Increase Security

These are amongst some of the most worrying words that enterprises and managers can hear.  And, yet, they are a part of day to day terminology- whether whispered behind  soundproof board room doors, discussed openly by upper management or colleagues addressing them casually over the wate...
in XpandionPosted by Yoav Michaeli

Do You Understand the Meaning of Behavior-Based Profiling?

Xpandion creates “behavior-based profiling” for business applications. Sounds impressive, huh? However, do you know what it means, exactly?

in XpandionPosted by Yoav Michaeli

Office Space- A funny movie about hackers or a real life security threat?

Though most SAP programmers are reliable, serious professionals, there are a few who are intent on harming their organizations – and because of these few, we are rightfully afraid of the power of SAP Programmers. They almost always have a significant number of authorizations in the production system...
in Security & AuthorizationsPosted by Yoav Michaeli

How to Become a Successful Security/Authorization Manager

The more Security and SAP Licensing Managers that Xpandion works with, the more confirmation we receive that there is a distinct difference in the actions taken by successful managers vs.  unsuccessful managers.  Using ProfileTailor Dynamics/ LicenseAuditor these successful managers implem...
in Security & AuthorizationsPosted by Yoav Michaeli

Who Authorized It?!

"Who authorized it?" is definitely the most asked question following a fraud event or leakage of information.  



157 Yigal Alon Street,

Tel Aviv 67443, Israel


US Office


33 West 19th Street, New York,

NY 10011, USA


India Office


C 103, Akruti Orchid Park, Andheri-Kurla Road,

Andheri East, Mumbai, India