Veriato Blog

Tag Results

  • Cyber Security Budget Trends for Businesses in 2019

    by Veriato | Dec 10, 2018
    • User Behavior Analytics
    • Machine Learning
    • cyber security
    Here are a few cyber security trends to adopt in 2019 that will keep your organization’s information as safe as possible.
    Full story
  • Why Trust is not Enough

    by Veriato | Jun 15, 2017
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Attacks
    • Insider Threat
    • Employee Monitoring
    Why high risk positions need to be monitored closely to help combat insider threats, and how User & Entity Behavior Analytics and User Activity Monitoring can help.
    Full story
  • 4 Steps to Reduce the Risk of Malicious Insider Activity

    by User Not Found | Jul 01, 2016
    • Insider Threat
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Attacks
    • Employee Monitoring
    • Data Protection
    Improve your organizational ability to detect insider threats before they become insider attacks, react quickly and with confidence to potential (or actual) problems.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    • Insider Threat
    • UBA
    • User Behavior Analytics
    • Veriato Recon
    • Behavior Analytics
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." The analysts did a great job defining what had beforehand been a largely undefined market.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story