• Twitter
  • FaceBook
Home > White Papers > CA Technologies > Dealing with Insider Threats to Cyber-Security

Dealing with Insider Threats to Cyber-Security

CA Technologies

While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. From executives to IT administrators to partners, many people have access to sensitive data that if publicly exposed, could have significant ramifications to an organization’s business—or even its existence.

Download this paper to find out about the technology available to help reduce the risk and enable information sharing within an organization.

Email this page
Published:  Jan 09, 2015
Length:  13
Type:  White Paper
Tags : 
insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management, password management, policy based management, security policies

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter