What were the biggest considerations for you when evaluating solutions for insider threat detection?

3.2k views4 Comments
Sort By:
Oldest
Director of Network Transformationa year ago
How do I protect my sensitive data, how do I protect myself from IT folks with full admin rights and my offboarding process for employees leaving the company.  Been burned by all of those in the past!
CISO in Softwarea year ago
Scale and performance.
CISOa year ago
First was defining the assets and actions that were important and what we wanted to do -- observe, alert, act, etc. From those requirements, we evaluated solutions to see how effective they would be for what we needed.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Chief Information Security Officer in Healthcare and Biotecha year ago
Couple of points - 
1. Easy of business 
2. Good employee experience
3. Data classification 
4. Granular level visibility
1

Content you might like

No Increase16%

1-5% increase47%

6-25% increase24%

26-50% increase6%

51-75% increase1%

76%+1%

Other2%

View Results
1.7k views1 Upvote
Director of Network Transformationa year ago
Excellent question!!  Folks, please share what should be included in a playbook/checklist.  Let's crowdsource one!
3
Read More Comments
4.2k views2 Upvotes4 Comments

Yes - one person46%

Yes - multiple people46%

No7%

View Results
3.1k views