arrow-end-inversearrow-enddefendpoint-coloureddefendpoint-thin-2insider-threatsavecto-logo-smallquotation-marksransomwaresocial-engineeringtrianglezero-days

Page 01 Download the article

Introduction

This article places the spotlight on activity logging. Here we explore how Defendpoint allows you to collect and log activity, while protecting employees.

With the increasing sophistication of cyber threats, achieving the appropriate level of security while also protecting users' data privacy rights is no easy task. Each day, 71 million potentially unwanted programs attempt installation or launch.*

Trying to combat this sheer volume with traditional, and often ineffective, means of defense (such as antivirus or network-based detection) can feel like an impossible task. Using this reactive approach can also spark a desire for total transparency and create a requirement for everything to be logged. Unfortunately, this can prove unmanageable and unrealistic in both resource and cost.

Attempts to make this task easier to manage and improve visibility can lead to user privacy rights being sacrificed. This can cause problems with worker councils trying to protect the legal rights of their fellow employees.