Data Loss Prevention Best Practices: Managing Sensitive Data in the Enterprise

Vendor registration required

Executive Summary

While a great deal of attention has been given to protecting companies' electronic assets from outside threats - from intrusion prevention systems to firewalls to vulnerability management - organizations must now turn their attention to an equally dangerous situation: the problem of data loss from the inside. In fact, in many organizations there's a gaping hole in the controlled, secure environment created to protect electronic assets. This hole is the now ubiquitous way businesses and individuals communicate with each other - over the Internet. Whether it's email, instant messaging, webmail, a form on a website, or file transfer, electronic communications exiting the company still go largely uncontrolled and unmonitored on their way to their destinations.

  • Format: PDF
  • Size: 814.7 KB