Keys to the Kingdom: Monitoring Privileged user actions for security and compliance by LogRhythm, Inc.Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
by LogRhythm, Inc.

> View this now

Published on: March 06, 2012
Type of content: WHITE PAPER
Format: Unknown
Length: 15 pages
Price: FREE

Overview:

For years, there has been much debate between which threat is the greatest concern for organizations – internal attack or external attack. While the volume of external attacks are far greater, insider attacks generally cause significantly more damage because the attackers already have accesses, such as privilege users. Monitoring the actions of these privilege users is essential for security and compliance reporting, but this level of security has been a challenge for many organizations today.


This paper examines some of the types of insider threats organizations face and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts