EN Thales lets the enterprise monitor and identify extraordinary data access. CipherTrust Security Intelligence logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes: