UBM: TECH DIGITAL RESOURCE LIBRARY

The OneSign Guide to Thwarting Insider Threat

Oct 01, 2007

Download According to a study published recently in the Journal of Computer Mediated Communication, about 80% of publicized data breaches came from internal sources. This suggests that organizations that have focused their IT security efforts only on protecting the perimeter are at high risk for potentially disastrous insider security breaches. Recognizing the magnitude of the insider threat, Carnegie Mellon University's Software Engineering Institute issued a research report that recommends 13 best practices to help detect and prevent insider threats. This Imprivata paper discusses the effectiveness of the Imprivata OneSign´┐Ż Platform in supporting these best practices and countering the insider threat.


Whitepaper