insider credentials

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name

Advanced Persistent Threats: Insider Credentials at Risk

Published By: NETIQ     Published Date: Dec 05, 2013
This flash point paper discusses advanced persistent threats, the risks they pose, and how automation makes real-time response a reality. It covers questions you should ask yourself and things to consider before making an investment.
Tags : 
netiq, advanced persistent threats, insider credentials, real-time threat response, automation, security, it management

Can You Shut Down an Advanced Persistent Threat Before Itís Too Late?

Published By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : 
netiq, api, hijacking, cyberthreats, insider credentials, security, it management

Closing the Loopholes in Identity Governance to Minimize Risk

Published By: NETIQ     Published Date: Jan 12, 2017
Todayís attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security

Add Research

Get your company's research in the hands of targeted business professionals.