skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 217749 Find in a Library
Title: Technology, People and Insider Threats
Journal: Homeland Defense Journal  Volume:5  Issue:1  Dated:January 2007  Pages:34-37
Editor(s): Don Philpott
Date Published: January 2007
Page Count: 4
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: This article describes security resources and measures developed by Vericept Corporation in order to prevent employee actions ("insider" threat) that are detrimental to an organization.
Abstract: Employees familiar with the inner workings of an organization have the knowledge and positioning to do harm to the company if they are so inclined. The only way to combat the insider threat is to adopt a defense-in-depth security strategy that does more than simply monitor access attempts from outside the electronic enterprise. It must also monitor the flow of information from within. A defense-in-depth strategy has at its core an organization's most precious assets: its information and its knowledge. A top priority for any organization is the preservation of its intellectual property. Vericept Corporation offers total content control throughout an organization from the desktop to the network perimeter. By monitoring all Internet-based traffic and stored data, Vericept identifies, captures, and prevents confidential information loss throughout the network. In so doing, it protects highly sensitive materials and classified information from leaving the network. It complies with procedures for handling protected citizen, patient, and employee information and prevents hacking and malicious activity by employees and contractors. Inappropriate online behavior is also deterred. One Federal agency, a long-standing customer of Vericept, reports that under Vericept there has been a 40-percent decrease in network abuse. The agency focuses on managing behavior in order to ensure proper attention to confidential internal information. The administrators continually enhance internal processes, and the results have been dramatic.
Main Term(s): Domestic Preparedness
Index Term(s): Data communications; Data security; Employee theft; Science and Technology; Technology transfer; White collar crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.