From Insider Abuse to Insider Accountability: Identity Analytics Discover Insider Threats

Date Added: Jan 2011
Format: PDF

Stricter enforcement of H1PAA privacy and security rules are creating an impetus for improved monitoring of insider privilege abuse. The traditional IT security focus on strong perimeter security, while assuming internal activity can be trusted, is no longer sufficient. There is a need for verification that user access and activity is necessary and appropriate to the user's job function and responsibilities, and no more, However, there Is also a need to provide verification and reporting in a way that business managers and executives can quickly understand and that does not tax an already overworked IT staff.