Page 25 - index
P. 25
Threat of Applications
The large majority of users’ access data through everyday applications, such as wealth
management or portfolio management, to do their jobs, but their actions are hidden in the large
volume of data generated through normal user activities.
Companies across a variety of industries rely on business applications that can access their
data, such as call center applications, financial systems, EMR/EHR, POS, eCommerce, Billing,
Claims processing, portfolio management, CRM, Patient administration, but these applications
aren’t as monitored or secured as their data storage infrastructures.
Once users login to these critical applications, many organizations have no idea what they are
doing. This is making everyday enterprise applications the weak link in today’s computer
networks.
Each of these toxic combinations of people, activities and applications has one thing in
common; they introduce substantial unaddressed user-based risk.
Security-conscious organizations must monitor user accounts to reduce the impact of this type
of user-based risk.
Regardless of your monitoring needs, user activity monitoring significantly enhances your
security program and allows security teams to mitigate user-based risks in a manner that
preserves user privacy.
About The Author:
Matt Zanderigo, Product Marketing Manager, ObserveIT
Matt is currently the Product Marketing Manager for ObserveIT’s User Activity
Monitoring solution. In this role, he leads the product marketing efforts, solution
messaging and the company’s freemium strategy.
Matt can be reached online at mailto:[email protected], TWITTER:
@MattZanderigo, www.linkedin.com/in/mattzanderigo, and at our company website
http://www.observeit.com/
25 Cyber Warnings E-Magazine – June 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide