Data Protection Strategies in the Age of the iPad, Malicious Insiders, and PCI
Presented by
The information explosion gives hackers, thieves, and malicious insiders a target-rich environment that perimeters cannot defend. To thread the needle between information protection and legitimate access, CISOs must focus on defending the content of files and communications, not just containers or conduits. Effective protection combines content awareness, policy-based protection, and strong authentication to discover and monitor sensitive information, protect it as it moves across networks, to mobile devices, and in the cloud, and deny illegitimate access without compromising the productivity of legitimate users.