What tools do you use for insider threat detection?

3.3k views16 Comments
Sort By:
Oldest
Senior Director, Technology Solutions and Analytics in Telecommunication2 years ago
There are a variety of tools available for insider threat detection. Some common tools include data leak prevention (DLP) tools, user activity monitoring (UAM) tools, and security information and event management (SIEM) tools. DLP tools help to prevent sensitive data from being leaked by identifying and blocking unauthorized attempts to copy or transfer data. UAM tools monitor user activity to identify anomalous behavior that could indicate an insider threat. SIEM tools provide a centralized platform for monitoring and managing security events. By using a combination of these tools, organizations can more effectively detect and respond to insider threats.
1 1 Reply
CISO in Software2 years ago

I agree with Nathan Hart response on the different tools and techniques he described.

Director, Information Security Engineering and Operations in Manufacturing2 years ago
A combination of tools from Microsoft mostly. 
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director, Strategic Security Initiatives in Software2 years ago
DLP and SIEM.
Director of Information Security in Energy and Utilities2 years ago
We currently us Microsoft Insider Risk Management tool.  Works well enough for us if you are a Microsoft shop.  Otherwise I've heard good things about Code42
Director of Tech and Cyber Strategy in Finance (non-banking)2 years ago
SIEM with UEBA as well as DLP as automated tools. We also perform manual audits using the logs from our PAM system.

Content you might like

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment

Yes, and it is always followed22%

Yes, but it is rarely followed54%

Some departments do, but not across the business14%

No9%

View Results
1.8k views2 Upvotes