User-based analytics are key to early identification of these kinds of security problems. A deep -- and quantitative -- understanding of user behavior can be used to determine a baseline of normal activities specific to the organization and its individual users. And more importantly, this data can be used to identify deviations from normal and send an alert if the view or access patterns of users fall outside logical norms:
- Have any documents been accessed from a strange location?
- Can I see authorized user transaction patterns?
- Who has accessed this document and who has not?
- Should THIS user be able to access THAT document?
- Who in the organization needs to know this -- and in what context?
Download your copy TODAY!