Friday, June 6, 2014

Snowden Anniversary and the Need for IAI

It has been one year since Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency and almost one year since Bradley Manning was sentenced to 35 years in prison for his role in WikiLeaks.

These high profile anniversaries make the time ripe to consider using Identity Access Intelligence (IAI) to detect insider data breaches, even those by authorized users.

These high profile anniversaries make the time ripe to consider using Identity Access Intelligence (IAI) to detect insider data breaches, even those by authorized users.
Rather than utilizing static rules that results in huge amounts of "problem activity," IAI applies clustering techniques that allow the data itself to reveal which activities are normal and which are threats as well as the very few instances of real data theft and data privacy violations. IAI is available as a low-cost on-demand SaaS service.
Download a white paper on data breach detection. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Interview with Edward Snowden - Swww.NBC.com, 06/06/2014

No comments:

Popular Posts

Copyright © 2010-2011 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.