Veriato Blog

  • Are we counting on a Maginot Line?

    by Mike Tierney | Jun 15, 2015
    • Employee Monitoring
    • Security Solution
    • Data Leaks
    • Data Protection
    A whole lot of time and money gets spent preventing acts or behaviors from happening.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story
  • Could You Have Seen It Coming?

    by Mike Tierney | Jun 12, 2015
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threats
    • Insider Threat Prevention
    • Insider Threat
    • Employee Monitoring
    • Veriato Recon
    • Veriato 360
    Congratulations Jo! You've been promoted to Supervisor! Of all the candidates, both internal and external, you stood out as most qualified and most ready for the job.
    Full story
  • Veriato impacts UK police force

    by Mike Tierney | May 08, 2015
    • Security Solution
    • Monitoring Software
    • Monitoring
    The concept of gathering evidence from digital media has evolved from a reactive process relying on law enforcement officers being able to seize and forensically examine computers, tablets and mobile phones.
    Full story
  • Fact: Employees Leave Your Company

    by Mike Tierney | Apr 25, 2015
    • Data Protection
    • Data Leaks
    • Insider Threat
    • Employee Monitoring
    • Veriato 360
    Whether it's a 'the door is always open' farewell, or a 'don't let the door hit you'' see ya, there are steps that must be taken to protect your company's interests.
    Full story