Star 0

Abstract

Sensitive information is too often leaked, lost and stolen, resulting from either erroneous or malicious insider actions. Yesterday’s approach of “securing the perimeter” is no longer enough; CIOs must secure information at the source. Security technologies are evolving from “perimeter-centric” to “data-centric,” encrypting data to carry protection regardless of where it is, or who touches it.