TECH DIGITAL RESOURCE LIBRARY

Defending Against Insider Threats

Jul 08, 2012

Download Recent events, such as the WikiLeaks breach have brought the problem of insider threats to the forefront. Effective management of insider threats involves a variety of areas, including privileged user management, Web access management, and information classification and control.

This video explores some innovative approaches to identifying and remediating the threat of improper insider actions on your overall IT infrastructure.


Videos

CA Technologies
http://www.ca.com