And on the basis of analysis of different solutions for mitigating insider threat, an largely improved solution was presented.
The announcement notes that what sets insider threats apart from other types of attacks is the use of normal, day-to-day activities to collect data.