The document discusses insider threats and proposes implementing the Hitachi ID Identity Manager solution. It provides background on insider threats, including sources like maliciousness, disregard of security practices, carelessness, and ignorance. It analyzes vulnerabilities in telecommunications, credit cards, and healthcare. It then summarizes Hitachi ID features like role-based access control, automatic deactivation of terminated users, and centralized access management. Implementing Hitachi ID could reduce productivity losses, save costs, and help comply with regulations by better controlling access.