This document discusses how user activity monitoring can improve data protection by monitoring the activities of application users, administrators, and external vendors. It notes that most data breaches involve unauthorized access to applications containing sensitive data by business users, who outnumber IT administrators 20 to 1. Traditional security tools like firewalls, identity and access management, and data loss prevention software fall short for monitoring application users. The presentation promotes a user activity monitoring solution that records users' screens and activities, profiles their behavior, generates real-time alerts of anomalous behavior, and integrates with security information and event management systems.