Control IT risk from the inside

The usefulness of the cloud and virtualisation has a dark side: businesses are more susceptible to insider security and privacy breaches. From privileged administrators to regular users with access to sensitive information, these users add complexity and challenges to a cloud and virtualisation-based business, causing organisations to look at: - Volume of data and logging IT activity; - Choosing a proactive rather than reactive approach to threats; - Balancing risk and productivity by knowing who has access to what data. This CA white paper examines how businesses can adopt a strong stance to defend against insider threats.

Provided by: CA Technologies Topic: Security Date Added: Oct 2011 Format: PDF

Find By Topic