New IT Security Survey Results -- Top Reasons To Monitor Users
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
March 7, 2014
1 Min Read
PRESS RELEASE
NEW YORK and SAN FRANCISCO, February 25, 2014 – BalaBit IT Security (www.balabit.com) today announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology.
Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:
Read more about:
2014Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
You May Also Like
More Insights