• RSS
  • Twitter
  • FaceBook
Home > White Papers > NetIQ > Address the Insider Threat of Privileged Users

Address the Insider Threat of Privileged Users

By: NetIQ
NetIQ

Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide. Any unprotected computer poses an insider threat to intellectual property, even if the user is the most ethical employee on the planet.

In this white paper, Dr. Eric Cole describes the defining aspects of the insider threat, its magnitude (monetization of stolen IP dwarfs that of stolen cars), and the main reasons insider threat is ignored. Cole then presents key focus areas for addressing the threat: policies and procedures, audits, and access controls.

The paper concludes with an overview of how NetIQ’s products specifically address those areas as well as enable organizations to manage an increasing number of servers and applications with fewer administrators.

Email this page
Published:  Jan 12, 2011
Length:  12
Type:  White Paper
Tags : 
netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware, anti virus, auditing, firewalls, intrusion detection, intrusion prevention



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter