FCW | The Business of Federal Technology
The Business of Federal Technology
Open Menu
  • People
  • IT Modernization
  • Digital Government
  • Security
  • Acquisition
  • Workforce
  • Events
  • Resources
    • Webcasts/Whitepapers
    • Reprints
    • List Rental
    • Advertise
    • Contact

Whitepapers

Combatting Insider Threats in the Federal Agency with Endpoint Security Analytics

Federal agencies are under attack from cyber-criminals and under scrutiny from Congress, but what about the potentially catastrophic insider threat? Most cyber-defense tools face outward, not inward, and do not offer a view of your endpoints such as laptops, workstations, and mail servers.

In this whitepaper learn about:

  • Current high-profile insider-threat cases
  • How to get a big-picture view of your network to gain visibility into endpoints
  • Ways that analytics can give you an early look at activity related to potential insider threats
  • How to establish a baseline of normal relationships and behaviors of your insiders

Sponsored by Guidance Software

 

Register to access this item.

Enter your email address.

If you are a new user, select “I don’t have a password” and hit submit. You will be taken to a short registration form. 

If you are a returning user, enter your password (or click on "forgot your password").

Can't register? Check out the answers to our Frequently Asked Questions.

What is your e-mail address?

My email address is:

Do you have a password?

Forgot your password? Click here

FCW | The Business of Federal Technology
  • About Us
  • Contact Us
  • Advertise
  • Subscribe
  • Digital Edition
  • Newsletter
  • Reprints
  • List Rental
  • © 1105 Media, Inc.
  • View our Privacy Policy and Terms of Service | CA: Do Not Sell My Personal Info
  • 1105 Media