What tools do you use for insider threat detection?

3.4k viewscircle icon16 Comments
Sort by:
Founder & CISO in Education3 years ago

A mix of Endpoint Detection, logging and monitoring from the IAM and PAM, SIEM, and DLP.

VP of Information Security in Finance (non-banking)3 years ago

There are number of tools that we use to detect insider threats, including but not limited to Splunk, SIEM, and DLP tools.

Director in Construction3 years ago

We focus on the tools with our Microsoft license

Director, Security Operations in Telecommunication3 years ago

We're using several different tools that provide for monitoring of these type activities, these include services available from Microsoft as a part of their Azure/O365 offering, as well as Privileged Access Management tools and 24x7 real-time log monitoring.

CIO/CISO in Healthcare and Biotech3 years ago

We use SIEM as our system of record for collecting/correlating insider threat information, along with data exfiltration protection (DLP/CASB). 

Content you might like

Privileged access management (PAM)41%

User authentication (e.g., passwordless, MFA, biometrics)72%

Machine identity management (e.g., keys, certificates, secrets)38%

Mobile & IoT authentication18%

Cloud IAM & Governance18%

View Results

Cost structure24%

Lack of in-house skills to migrate / deploy / manage workloads on cloud50%

Security / governance compliance concerns19%

Lack of performance or features that you have on-prem but not the cloud6%

View Results