Report

Enemy Inside the Gates: The Resurgence of the Insider Threat

Insider threat has always been part of an organization’s cybersecurity risk matrix.
/

Boston, September 2, 2021 –Insider threat is often overshadowed by high-profile external attacks such as ransomware, phishing, business email compromise, and most recently, API-based attacks. The COVID-19 pandemic, remote work, and associated stresses and uncertainties have led to a resurgence. Insider threat is difficult to detect with traditional cybersecurity tools and manual processes, as insiders have access to networks and data by the very nature of their work. For this reason, several companies have developed specific products and tools to detect and manage insider threat.

This Impact Report provides an overview of emerging insider threat considerations and identifies several solution providers in this growing market. This report is based on briefings, discussions, and participation in virtual events with solution providers, technologists, and IT and security professionals at midsize and large organizations. It is also based on more than 35 in-depth interviews with professionals knowledgeable about insider threat conducted from April 2021 through June 2021.

This 30-page Impact Report contains two figures and three tables. Clients of Aite-Novarica Group’s Cybersecurity service can download this report, the corresponding charts, and the Executive Impact Deck.

This report mentions ActivTrak, Code42, Countercraft, Dasera, Dtex, EkranSystem, eSentire, Gurucul, LogPoint, Microsoft, Securonix, and SecZetta.

Related Content

ESG and Sustainability for Healthcare Payments Stakeholders

ESG focus in the healthcare industry is still emerging, but opportunity awaits.

The Modernization Imperative

Core modernization is a top priority of P/C and L/A/B insurer IT organizations.

Client Perspectives on Behavioral Biometrics and Device Fingerprinting Solutions

Organizations are increasingly relying on behavioral biometrics and device fingerprinting solutions for continuous and passive user authentication.

Get Summary Report

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.