+ 1-800-492-3951 or + 3184.108.40.206.20 (GMT+1)
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Detect & Respond
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Zero Trust Security
Reduce the risk of security breaches from the insider threat
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
On June 5, 1999, the Director of Central Intelligence Issued Directive 6/3 (DCID 6/3) titled "Protecting Sensitive Compartmented Information Within Information Systems." It establishes the security policy and procedures for storing, processing, and communicating classified intelligence information in information systems. An implementation manual corresponding to DCID 6/3 was published on May 24, 2000.
The directive applies to all United States government organizations’, their commercial contractors', and Allied governments' information systems that process, store, or communicate intelligence information.
IS Decisions solutions fulfil the following DCID 6/3 requirements for dealing with information system security:
DCID 6/3 Policy
DCID 6/3 Manual
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved