Security

Control IT risk from the inside

Download Now Free registration required

Executive Summary

The usefulness of the cloud and virtualisation has a dark side: businesses are more susceptible to insider security and privacy breaches. From privileged administrators to regular users with access to sensitive information, these users add complexity and challenges to a cloud and virtualisation-based business, causing organisations to look at: - Volume of data and logging IT activity; - Choosing a proactive rather than reactive approach to threats; - Balancing risk and productivity by knowing who has access to what data. This CA white paper examines how businesses can adopt a strong stance to defend against insider threats.

  • Format: PDF
  • Size: 692.37 KB