Companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity. However, the proliferation of applications is creating a serious security risk because identifying users’ risky behavior and non-compliance with policies can be nearly impossible. The typical organization now collects and stores a vast amount of customer data. In addition, the large number of employees accessing applications makes it difficult for organizations to keep track of exactly “who’s doing what”.
Historically, companies have identified these types of risks through audits and assessments of application access and usage logs. This manual process is resource intensive. It requires significant staff time to correlate and review logs due to the large volume of users and activity. In addition, each application logs user actions differently and at varying levels of granularity with many applications not producing logs at all. These logs typically contain hundreds or thousands of discrete events in obscure technical language. As a consequence, organizations that rely upon logs from applications and devices find it nearly impossible to determine what a user actually did.
We hope you will join us on October 7 when we discuss the findings of What You Don’t Know Will Hurt You: A Study of the Risk from Application Access and Usage, sponsored by ObserveIT. Please register for the event.