What were the biggest considerations for you when evaluating solutions for insider threat detection?
Sort by:
CISO2 years ago
First was defining the assets and actions that were important and what we wanted to do -- observe, alert, act, etc. From those requirements, we evaluated solutions to see how effective they would be for what we needed.
CISO in Software2 years ago
Scale and performance.
Director of Network Transformation2 years ago
How do I protect my sensitive data, how do I protect myself from IT folks with full admin rights and my offboarding process for employees leaving the company. Been burned by all of those in the past!
Couple of points -
1. Easy of business
2. Good employee experience
3. Data classification
4. Granular level visibility