E-Guide: Monitoring Strategies for Insider Threat Detection

E-Guide: Monitoring Strategies for Insider Threat Detection

Cover

Insider threat detection is a vital part of the security of any enterprise organization. In this e-guide, part of the SearchSecurity.com Insider Threats Security School lesson, learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. These common insider crimes include:

  • Insider IT sabotage
  • Insider fraud
  • Theft of intellectual property

Continue reading to learn more about monitoring strategies for insider threat detection and learn how to deal with the above insider crimes.

Vendor:
IBM
Posted:
22 Mar 2011
Published
22 Mar 2011
Format:
PDF
Length:
7 Page(s)
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy