What were the biggest considerations for you when evaluating solutions for insider threat detection?


3k views4 Comments

Director of Network Transformation, Self-employed
How do I protect my sensitive data, how do I protect myself from IT folks with full admin rights and my offboarding process for employees leaving the company.  Been burned by all of those in the past!
CISO in Software, 10,001+ employees
Scale and performance.
CISO, Self-employed
First was defining the assets and actions that were important and what we wanted to do -- observe, alert, act, etc. From those requirements, we evaluated solutions to see how effective they would be for what we needed.
Chief Information Security Officer in Healthcare and Biotech, 1,001 - 5,000 employees
Couple of points - 
1. Easy of business 
2. Good employee experience
3. Data classification 
4. Granular level visibility
2

Content you might like

No plans on undergoing a migration yet34%

Currently deploying SAP S/4HANA27%

Migrating to SAP S/4HANA within the next 1-2 years19%

Migrating to SAP S/4HANA within the next 3-6 years10%

Already have SAP S/4HANA in production9%


3998 PARTICIPANTS

31.5k views154 Upvotes32 Comments

Slow recovery response times34%

Data availability is limited49%

Too expensive to scale effectively53%

Difficult to manage for widespread use37%

Prone to misconfiguration12%

No - There are no drawbacks7%


568 PARTICIPANTS

1.8k views3 Upvotes

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
48.7k views133 Upvotes326 Comments