whitepapers | Data Security
How do leading companies mitigate the invisible problem of rogue insiders? Imperva analyzed dozens of companies to understand some of the commonly deployed practices across human resources, legal and technology to stop malicious insiders from taking data and intellectual property. Specifically, we identify nine practices top enterprises have found the most useful to control the leakage of digital assets. Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This research presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals.