An insider threat is a malicious, careless or negligent threat to an organization that comes from people within the organization such as employees, former employees, contractors, or business associates, who have inside information concerning the organization’s security practices, data, and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, or the sabotage of computer systems. The insider threat can be further described using the “rule of three”. Products and services in this market include monitoring and surveillance capabilities. Although “monitoring” and “surveillance” are often used interchangeably.
Gartner defines the security and information event management (SIEM) market by the customer’s need to analyze event data in real time for early detection of targeted attacks and data breaches, and to collect, store, investigate and report on log data for incident response, forensics and regulatory compliance. SIEM technology aggregates event data produced by security devices, network infrastructure, systems and applications. The primary data source is log data, but SIEM technology can also process other forms of data, such as network telemetry. Event data is combined with contextual information about users, assets, threats and vulnerabilities. The data may be normalized, so that events, data and contextual information from disparate sources can be analyzed for specific purposes, such as network security event monitoring, user activity monitoring and compliance reporting. The technology provides real-time analysis of events for security monitoring, query and long-range analytics for historical analysis.