Get Pricing Start Free Trial

Insider Threat Blog

Picture of  Cloud ObserveIT Insider Threat Software
Posted on Monday, January 4, 2016 by David Mai
One of the biggest risks that companies face today is the growing popularity and availability of cloud-based applications – shadow IT. These applications can be used by any of your employees and they share huge amounts of data that fly under the radar of your security team. The danger lies in the fact that these cloud applications are also prime avenues for exposing sensitive or regulated data to third parties. To make matters worse, it’s very difficult to keep cloud apps secure because of the... Continue Reading →
Data Loss Insider Threat
Posted on Wednesday, December 30, 2015 by Gaby Friedlander
The Connection between Insider Threat and Data Loss Most enterprises rely on Data Loss Prevention (DLP) solutions to secure information, but they still can’t keep data from leaving the company. That’s because the solutions can’t properly monitor the digital activities of employees, priviledged administrators and thirdparty users – insiders who all have access to critical data. So it’s not surprising that 75% of insider threats go unnoticed, according to CERT Insider Threat Center. In an attempt... Continue Reading →
Insider Threat
Posted on Wednesday, December 23, 2015 by David Mai
The Shortlist of Claims Systems You Need Visibility into Insurance companies rely on countless claims systems to help manage important tasks, such as policy administration, underwriting, billing, claims management and even call centers. Employees working within these business critical applications require legitimate access to vast amounts of customer data and claims information on a regular basis. However, it has become increasingly difficult to track of exactly “who’s doing what” in these... Continue Reading →
Insider Threat Trifecta ObserveIT
Posted on Wednesday, December 16, 2015 by David Mai
This Whitepaper describes a new – and important – way of looking at the greatest source of IT risk in your organization. According to The 2015 Insider Threat Spotlight Report, 62 percent of security professionals say insider threats have become more frequent in that last 12 months (June, 2015). Insider threats are greater than ever before, and must be evaluated – and mitigated – by looking at the intersection of three business-critical elements found in every organization: people, activities... Continue Reading →
Posted on Wednesday, December 9, 2015 by Gaby Friedlander
Most Data Loss Prevention (DLP) solutions are unable to determine what type of user behavior is risky and who is becoming a threat. It can take months before an employee or trusted third-party user attempts to remove information from the company via emails, unauthorized cloud applications or thumb drives – but many DLP solutions can’t follow the steps insiders took before they stole sensitive information and organizations typically find out only after a data breach has already occurred. In this... Continue Reading →
Posted on Wednesday, December 2, 2015 by David Mai
While many data breaches in 2015 were carried out by anonymous hackers, many of the most dangerous one’s were conducted by employees from inside the company, not an uncommon occurrence these days. Fact be told, the majority of data breaches are caused by insiders, with a recent report by Baker & Hostetler LLP suggesting that around 36% of problems occur due to employee negligence or human error, and another 16% happening through insider theft. Only 22% actually occurs from outside theft,... Continue Reading →
Posted on Wednesday, November 18, 2015 by David Mai
The threat of inside attackers has grown exponentially in recent years. Consider that in 2007, a KPMG study found that just 4% of all reported cyberattacks were caused by malicious insiders, but only three years later, that number rose to 20%. In an extensive review in 2013, Verizon found that 69% of information security incidents were attributed to inside threat. Surely, the number has only increased since then. The growing threat from insiders could be explained by the expanded growth of data... Continue Reading →
Insider Threat like Dominoes Falling
Posted on Wednesday, November 11, 2015 by Gaby Friedlander
If your organization is able to identify when an employee searches for “How to disable DLP” or adds sensitive files to DropBox – it has the necessary context to spot disgruntled and malicious inside threats before they leak data. Yes, by focusing on your own users, you’re able to build profiles of normal user behavior and identify high-risk users that require further investigation without having to wade through excessive individual event noise. If you can understand a user’s risk and his intent... Continue Reading →
Posted on Wednesday, November 4, 2015 by Dimitri Vlachos
Insider Threat Identified as a Use Case for Behavior Analytics Boston, November 4, 2015 – ObserveIT, the leader in user behavior analytics for insider threat detection, has been recognized by Gartner as a “Representative Vendor” in its 2015 Market Guide for User and Entity BehaviorAnalytics (UEBA). Gartner reports that in 2015 “inquiries by end-user organizations on user behavior analytics rose nearly tenfold, and on security analytics by 25%.” Additionally, “Gartner expects UEBA market... Continue Reading →
Posted on Monday, November 2, 2015 by Gaby Friedlander
Most enterprises rely on Data Loss Prevention (DLP) solutions to secure information, but they still can’t keep data from leaving the company. That’s because the solutions can’t properly monitor the digital activities of employees, privileged administrators and third-party users – insiders who all have access to critical data. In this blog – the first in a three-part series that examines inside threat and the tools that can be used to stop it – we’ll look at the connection between the threats... Continue Reading →

Pages

Try it Now
Contact Us