Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:
Products & ReleasesNEW YORK and SAN FRANCISCO, February 25, 2014 – BalaBit IT Security (www.balabit.com) today announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology.
New IT Security Survey Results -- Top Reasons To Monitor Users
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
- Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
- Preventing Attackers from Navigating Your Enterprise Systems
- Protecting Enterprise Data from Malicious Insiders
- Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code
- Cybersecurity Outlook 2022 Virtual Event