Research Library > CA Technologies > Dealing with Insider Threats to Cyber-Security

Dealing with Insider Threats to Cyber-Security

White Paper Published By: CA Technologies
CA Technologies
Published:  Jan 09, 2015
Type:  White Paper
Length:  13 pages

While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. From executives to IT administrators to partners, many people have access to sensitive data that if publicly exposed, could have significant ramifications to an organizations businessor even its existence.

Download this paper to find out about the technology available to help reduce the risk and enable information sharing within an organization.

Tagsinsider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management