Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders.
The most popular technologies to deter insider threats are Data Loss Prevention (DLP), encryption, and identity and access management solutions.