> NetIQ > Address the Insider Threat of Privileged Users

Address the Insider Threat of Privileged Users

Published By: NetIQ
NetIQ
Published:  Jan 12, 2011
Length:  12 pages

Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide. Any unprotected computer poses an insider threat to intellectual property, even if the user is the most ethical employee on the planet.

In this white paper, Dr. Eric Cole describes the defining aspects of the insider threat, its magnitude (monetization of stolen IP dwarfs that of stolen cars), and the main reasons insider threat is ignored. Cole then presents key focus areas for addressing the threat: policies and procedures, audits, and access controls.

The paper concludes with an overview of how NetIQ’s products specifically address those areas as well as enable organizations to manage an increasing number of servers and applications with fewer administrators.



Tagsnetiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware