Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Security starts from within —
secure sensitive data
from insider threats
Chief Information Security Officers are actively
...
Upcoming SlideShare
Loading in …5
×

[Infographic] Stop Insider Threat

2,198 views

Published on

Chief Information Security Officers are actively strengthening the perimeter defenses of their organizations, but what about threats that are already inside the enterprise?

Published in: Software
  • Be the first to comment

  • Be the first to like this

[Infographic] Stop Insider Threat

  1. 1. Security starts from within — secure sensitive data from insider threats Chief Information Security Officers are actively strengthening the perimeter defenses of their organizations, but what about threats that are already inside the enterprise? Employee launches malware by mistake Disgruntled insider purposely causes harm 3rd party compromises sensitive data Employees with privileged access to sensitive data carry the greatest risks 60% 61% 70% of all attacks are caused by insider threats1 of organizations do not monitor privileged users more closely than regular users1 of organizations do not have a data security solution that supports entitlement reporting2 IBM, the IBM logo, ibm.com, and Guardium are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml 1 “IBM X-Force Research 2016 Cyber Security Intelligence Index “ 2 “Privileged Access: Manage the Potential Risk to Safeguard Your Data”. UBM Research. 2016. 3 “The Forrester Total Economic Impact of IBM Security Guardium.” Forrester Research. Know your users Who has access to sensitive data? What are users and administrators doing with the data? Know your data What data is sensitive? Can you control privileged user access to sensitive data? What can you do to mitigate insider threats? Download the ebook reduction in time spent on security and compliance3 reduced likelihood of a breach3 IBM® Security Guardium® is a comprehensive data security platform that provides a full range of capabilities — from discovery and classification of sensitive data to vulnerability assessment to real-time monitoring of data and file activity. 45% 20% Get the ebook to learn more about how Guardium can help you protect sensitive data from insider threats.

×