Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile working arrangements driven by the COVID-19 pandemic and other factors. Organizations may have confidence that the only users remotely accessing information resources are doing so with authorized credentials, but they may not know who is using those credentials or whether authorized users are engaged in unauthorized activities. As a result, organizations need tools that monitor and assess activities associated with authorized credentials. Some such tools include user activity monitoring (UAM) solutions that record and analyze user interactions with and use of applications, databases, and other information resources. The need for such tools is increasingly recognized, even by data protection authorities.
Please see full publication below for more information.