Vormetric Resource Center

Selecting The Right Encryption

As tempting as it may be to simply use a security technology that worked in one area as the solution for another, the right approach is to carefully consider what risks are you trying to address and the choose the technology that is optimized to address them.

The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal accounts by the latest malware attacks. This infographic captures the key findings of the report, focusing on comparisons critical results around organizations insecurities, concerns, technology investments as well as comparisons against their US counterpart's responses.

The 2014 Vormetric Insider Threat Report – Australian Edtition

The 2014 Vormetric Insider Threat Report – Australian Edition is based on a survey conducted by Analyst group Ovum of enterprise IT decision makers in Australia. With 183 participants, the survey found that insider threats are a core concern for enterprises – with only 9% of organizations feeling safe from the risks of privileged insiders and the compromise of their credentials by outside attacks. See this InfoGraphic for details of who organizations feel insecure, what these professional consider to be the top insider threat concerns, and more.

In this infographic, see the summarized results of the 2013 Vormetric Insider Threat Report. Based on the detailed survey responses of over 700 IT decision makers, the report found that organizations feel increasingly vulnerable to insider threats, and that there are major gaps between existing security processes and the technologies needed to address them. Details here show how most organizations lack the security controls needed to prevent these threats, today focus on protecting networks on PCs (rather than critical data) but recognize that changes are required and are investing to solve the problem.

This survey focused on IT concerns around Insider Threats and the IT, security and business professionals surveyed had direct knowledge and responsibilities in this area. See in this infographic how organizations remain vulnerable to numerous insider threat vectors, including:

  • Abuse of Privileged User rights by employees
  • Privileged Users
  • New technology concerns
  • And more

For more detail, see the Insider Threat Research Brief. (

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental