So, every time a user goes online, they establish their identity and create a trail of actions that can be analyzed to form a pattern of typical behavior. Cisco Identity Intelligence monitors a graphical database of those behaviors in real time, made up of all the different stores of identity the user creates – including actions, connections, locations, devices and applications. These insights are analyzed in real time and used to compile, change and monitor a user trust score that – when it reaches a certain threshold – can trigger security and access policy actions in real time.