Download now Registration not required
While a great deal of attention has been given to protecting companies' electronic assets from outside threats - from intrusion prevention systems to firewalls to vulnerability management - organizations must now turn their attention to an equally dangerous situation: the problem of data loss from the inside. In fact, in many organizations there's a gaping hole in the controlled, secure environment created to protect electronic assets. This hole is the now ubiquitous way businesses and individuals communicate with each other - over the Internet. Whether it's email, instant messaging, webmail, a form on a website, or file transfer, electronic communications exiting the company still go largely uncontrolled and unmonitored on their way to their destinations.
- Format: PDF
- Size: 814.7 KB