E-Guide: Monitoring Strategies for Insider Threat Detection

E-Guide: Monitoring Strategies for Insider Threat Detection

Cover

Insider threat detection is a vital part of the security of any enterprise organization. In this e-guide, part of the SearchSecurity.com Insider Threats Security School lesson, learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. These common insider crimes include:

  • Insider IT sabotage
  • Insider fraud
  • Theft of intellectual property

Continue reading to learn more about monitoring strategies for insider threat detection and learn how to deal with the above insider crimes.

Vendor:
IBM
Posted:
22 Mar 2011
Published:
22 Mar 2011
Format:
PDF
Length:
7 Page(s)
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!