HR Hero Your Employment Law Resource
 

Enterprise Data Security: The Basics of User Behavior Analytics

White Paper Published By: CA Technologies
CA Technologies
Published:  Sep 25, 2017
Type:  White Paper
Length:  8 pages

Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise.

In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.



Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.