BigID announced Activity Explorer, a new capability that delivers auditability and granular activity investigation to strengthen insider risk detection and response. With Activity Explorer, organizations can review, search, and analyze activity across cloud and on-prem environments, including AWS S3, SharePoint, OneDrive, Google Drive, and NetApp, all within a unified interface for user accounts, service accounts, and AI agents.

Organizations manage massive volumes of sensitive data across distributed environments. Yet when incidents occur, a deleted file, unauthorized access, suspicious downloads, security teams often lack the visibility to answer the most critical questions: who or what accessed the data, when, and how. Traditional audit logs are fragmented, incomplete, or unavailable, slowing response and increasing both insider risk and AI-driven exposure.
Activity Explorer solves this challenge by centralizing activity events, from human user and service accounts, to automated or AI-based processes, into a searchable, filterable experience that gives analysts and investigators immediate clarity. Teams can rapidly trace behavior, validate suspicious actions, review historical events, and support compliance audits with complete, trustworthy activity records.
Key highlights:
- Unified activity auditing across hybrid environments: Access consolidated user activity logs across AWS S3, SharePoint, OneDrive, Google Drive, and NetApp, eliminating blind spots across cloud, SaaS, and on-prem data stores.
- Visibility across all identity types: Track activity across users, service accounts, and AI agents – ensuring complete oversight of all identities that access or move sensitive data.
- Activity investigation: Search and filter user events by date, user, operation, resource, or any combination, helping teams quickly answer questions like “Who deleted this file?” or “What did this user access yesterday?”
- Audit history: Maintain a comprehensive record of activity across sensitive data to support forensic investigations, incident response, and required audit logging for regulations like HIPAA, GLBA, and GDPR.
- Breach investigation & blast-radius analysis: Identify data touched by a compromised account during a breach window, helping teams determine exposure scope and accelerate containment.
- Accelerated insider risk detection: Surface patterns tied to unauthorized access, mass downloads, suspicious deletions, or unusual identity behavior, helping teams detect risky actions early.
- Better context for data security teams: Combine activity logs with BigID’s sensitivity classification and data context to understand not just what happened, but what type of data was involved and how risky it was.
“Organizations can’t protect what they can’t see – and they can’t investigate what they can’t trace,” said Nimrod Vax, Chief Product Officer at BigID. “With Activity Explorer, we’re giving security teams unified visibility into user, service account, and automated activity across their hybrid environment, helping them investigate insider risks, support compliance, and strengthen their data security posture.”
