Top 5 Technologies That Detect Insider Threats

Printer-friendly versionEmail this CRN article

5. Database Activity Monitoring

Database activity monitoring is a mature technology that helps audit and track database logs, keeping track of changes that could signal a security incident and prevent unauthorized activity. Most of the deployments have been driven by compliance mandates, but organizations are increasingly deploying database activity monitoring software to reduce the risks posed by internal threats.

Security experts warn that the software requires tuning and proper configuration to get it to efficiently perform monitoring functions. Rules can be fed in to alert on issues unique to the company, but complex rules can bog down performance.


Printer-friendly versionEmail this CRN article

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.