sponsored by IBM
Posted:  22 Mar 2011
Published:  22 Mar 2011
Format:  PDF
Length:  7  Page(s)
Type:  eGuide
Language:  English

Insider threat detection is a vital part of the security of any enterprise organization. In this e-guide, part of the SearchSecurity.com Insider Threats Security School lesson, learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. These common insider crimes include:

  • Insider IT sabotage
  • Insider fraud
  • Theft of intellectual property

Continue reading to learn more about monitoring strategies for insider threat detection and learn how to deal with the above insider crimes.

Intellectual Property | Intrusion Detection | Intrusion Detection Systems | Intrusion Prevention | Intrusion Prevention Systems | Security | Security Audits | Security Management | Security Threats

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement