This resource is no longer available
Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
For years, there has been much debate between which threat is the greatest concern for organizations – internal attack or external attack. While the volume of external attacks are far greater, insider attacks generally cause significantly more damage because the attackers already have accesses, such as privilege users. Monitoring the actions of these privilege users is essential for security and compliance reporting, but this level of security has been a challenge for many organizations today.
This paper examines some of the types of insider threats organizations face and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.