Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:
Announcements
New IT Security Survey Results -- Top Reasons To Monitor Users
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
More Insights
Editors' Choice
Webinars
Reports
White Papers
More Insights