Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

Top 5 Technologies That Detect Insider Threats

Insider threats range from disgruntled employees out to destroy the business to careless workers attempting to bypass security controls. These technologies are essential in mitigating the risks associated with internal threats.

Back 1   2   3   ... 6 Next

photo
5. Database Activity Monitoring

Database activity monitoring is a mature technology that helps audit and track database logs, keeping track of changes that could signal a security incident and prevent unauthorized activity. Most of the deployments have been driven by compliance mandates, but organizations are increasingly deploying database activity monitoring software to reduce the risks posed by internal threats.

Security experts warn that the software requires tuning and proper configuration to get it to efficiently perform monitoring functions. Rules can be fed in to alert on issues unique to the company, but complex rules can bog down performance.

 
 
Back 1   2   3   ... 6 Next

sponsored resources