top of page

User Monitoring Not Keeping Up With Risk Managers’ Needs

The output of this study is intriguing and certainly reinforces the trend in application control, stateful application control, and file integrity monitoring solutions.  Understanding application usage and behavior as well as privilege management are key to detecting and defending against malicious attack.


Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page