Read the original article: How behavior analytics can thwart insider threats
A combination of user behavior analysis and identity attributes and privileges can surface anomalous activity, set off alerts and prompt response and mitigation.
Read the original article: How behavior analytics can thwart insider threats