This resource is no longer available

Cover Image

The notion of a perimeter has shifted: today’s perimeters are defined by people rather than location. But protecting this “people perimeter” from insider threats requires an understanding of each user’s behavior, intent and situational context.

This e-book explores insider threat management software platforms and highlights the specific capabilities needed to secure the modern perimeter, including:

  • Understanding people-centric user risk
  • Threat detection & analytics
  • Privacy & compliance
  • And more
Vendor:
Proofpoint
Posted:
Feb 8, 2021
Published:
Jul 28, 2020
Format:
PDF
Type:
eBook

This resource is no longer available.