Veriato Blog

  • 3 Steps To Protect Your Data From Leaving With A Departing Insider

    by Mike Tierney | May 25, 2016
    • Insider Threat
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    What is the High Risk Exit Period? It’s the period of time between when an insider decides to leave the organization and the day they actually do leave.
    Full story
  • The Widespread Risk of Insider Threats

    by Mike Tierney | May 10, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Threats
    There is a great infographic by Deloitte on the topic of insider threats. They've done a wonderful job packing a great deal of information into an easy to understand presentation.
    Full story
  • Best Practices for Mitigating Insider Threats

    by Mike Tierney | May 05, 2016
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Insider Threats
    • Veriato Recon
    Here we highlight 5 of the 19 practices that we believe can have a significant positive impact on your ability to secure against the insider threat.
    Full story
  • What’s in a name? And why change it?

    by Mike Tierney | Feb 29, 2016
    We’ve changed our name to Veriato. So what? Companies change names all the time. Or they change a logo, or their brand color. Why? What prompts an organization to expend the time, effort, and money it takes to change its face to the world?
    Full story
  • Veriato, formerly known as SpectorSoft FAQ

    by Mike Tierney | Feb 17, 2016
    • Veriato News
    • Veriato
    • Spectorsoft
    Wondering how SpectorSoft changing to Veriato may affect you? See below for answers to questions that you may have.
    Full story
  • Is Employee Monitoring Legal?

    by Mike Tierney | Jan 04, 2016
    • Insider Threat
    • Insider Attacks
    • Monitoring Software
    • Veriato 360
    • Monitoring
    • Employee Monitoring
    As the number of costly insider theft, fraud, lower productivity or inappropriate workplace behavior continues to rise, more companies are recognizing the need for an employee monitoring program.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    • Insider Threat
    • UBA
    • User Behavior Analytics
    • Veriato Recon
    • Behavior Analytics
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." The analysts did a great job defining what had beforehand been a largely undefined market.
    Full story
  • The Numbers Boggle The Mind

    by Mike Tierney | Nov 09, 2015
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    The vast (overwhelming) majority of your defenses were defeated when the insider became an insider.
    Full story