Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

New methods for addressing insider threats: A roundtable discussion

John Dix | March 18, 2014
Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees.

RIFAI: I think organizations are asking for finished intelligence at this point. They just want to know what the answer is. They have already made substantial investments and they want to be able to leverage those investments in a way that's meaningful. And I think there are technologies out there, specifically in the analytics layer, that allow you to do just that. You are just simply collecting the information today, but now you can turn it into something that answers fairly complex questions and enables you to make informed decisions.

 

Previous Page  1  2  3  4  5  6 

Sign up for MIS Asia eNewsletters.