RSS feed Get our RSS feed

News by Topic

Enterprise Data Security: The Basics of User Behavior Analytics

CA Technologies

Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise.

In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.

Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
 Email this page
Published:  Sep 25, 2017
Length:  8
Type:  White Paper