Source: https://www.e-safecompliance.com/resources/Whitepapers/REVIEW%20OF%20TECHNOLOGIES%20TO%20TACKLE%20INSIDER%20THREATS%20v%202.0.pdf