Imperva Blog|Login|中文Deutsch日本語

White Papers

Selected Tag: File Monitoring | Show All

Download White Paper

An Inside Track on Insider Threats


How do leading companies mitigate the invisible problem of rogue insiders? Imperva analyzed dozens of companies to understand some of the commonly deployed practices across human resources, legal and technology to stop malicious insiders from taking data and intellectual property. Specifically, we identify nine practices top enterprises have found the most useful to control the leakage of digital assets. Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This research presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals.

Tags: Insider Threat, File Security, File Monitoring, File Auditing


Download White Paper

10 Building Blocks for Securing File Data


Three fundamental capabilities are lacking in most organizations:
  1. Operationally efficient file activity monitoring and auditing
  2. Scalable user rights management for files
  3. Automated business policy enforcement for file data
These three capabilities are core components of the emerging File Activity Monitoring market, and form the basis of a phased approach to file security. This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies.

Tags: File Security, Security Policies, File Monitoring, File Auditing

Selected Tag: File Monitoring | Show All


Term of the Month