Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Blog Feed Post

A look inside the 2015 European Insider Threat Report

The Most Dangerous InsidersToday marks the release of our latest insider threat report in Europe, investigating how IT Decision Makers in the region are evaluating and addressing the risks posed by this specific threat vector. This is the third time we have conducted European research into this area (following research released in March 2014 and in April 2013), with the latest findings suggesting that organizations are still struggling to protect their data.

One of the primary reasons that organizations feel vulnerable is because an important way to mitigate this threat is to make sure insiders are restricted in what they can see and do. That way, if they do happen to be compromised by external hackers (or simply end up going ‘rogue’), the damage that can be caused is limited. This is, however, easier said than done. With more devices connecting to the corporate network than ever before, and with cloud services becoming an intrinsic, vital part of day to day business, restricting users from an IT perspective can also restrict the business from a productivity perspective. Organizations realize this, and they realize that the computer users with the most powerful system rights pose the greatest risk.

ClickToTweet: A Look Inside – The 2015 European Insider threat Report @socialTIS http://bit.ly/1HRbkpp http://bit.ly/1JVrX3i

The leading statistic from the research tells us that more than half (54 percent) believe that privileged users (e.g. system, database and network admins) pose the biggest risk to their organization – which is a big increase from 38 percent in last year’s research.

Andrew Kellett from Ovum, the industry analyst firm that the research was conducted in conjunction with, neatly summarizes the challenge: “Although most organizations will have already realized that this type of user account needs to be implemented and overseen with far greater care than they perhaps once were, there remains a variety of technical challenges to overcoming the risk they pose – not least because this type of user account is usually used to perform essential network maintenance and administration procedures that cannot be interfered with.”

What this really all boils down to is separating what your users can see from what they can do, and what better way to do that than with encryption: if your administrators have wide reaching network privileges, but cannot read any of the data that they oversee, the risk – should they be compromised in any way – is mitigated, without interfering with their ability to do their job.

To find our more and to download the report, visit the dedicated page.

The post A look inside the 2015 European Insider Threat Report appeared first on Data Security Blog | Vormetric.

Read the original blog entry...

More Stories By Vormetric Blog

Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, big data and cloud environments. Data is the new currency and Vormetric helps over 1400 customers, including 17 of the Fortune 30 and many of the world’s most security conscious government organizations, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading data security platform that incorporates application transparent encryption, privileged user access controls, automation and security intelligence.