From Insider Abuse to Insider Accountability: Identity Analytics Discover Insider Threats

Stricter enforcement of H1PAA privacy and security rules are creating an impetus for improved monitoring of insider privilege abuse. The traditional IT security focus on strong perimeter security, while assuming internal activity can be trusted, is no longer sufficient. There is a need for verification that user access and activity is necessary and appropriate to the user's job function and responsibilities, and no more, However, there Is also a need to provide verification and reporting in a way that business managers and executives can quickly understand and that does not tax an already overworked IT staff.

Provided by: Veriphyr Topic: CXO Date Added: Jan 2011 Format: PDF

Find By Topic