Tools & Techniques for Data Loss Prevention
sponsored by Symantec Corporation and Iron Mountain Digital and Websense and Lumension Security and Utimaco Safeware
Do you cringe when you read about a lost laptop? Are you nervous that your Internet connection might be a giant intellectual-property sieve? Despite widespread regulatory and contractual stipulations for data protection, chances are that your organization hasn't developed a wholly effective architecture for thwarting sensitive information leakage.
In part three of this video series, Pete Lindstrom from the Burton Group evaluates various protection technologies and strategies within the framework of a comprehensive information risk management strategy.
(THIS RESOURCE IS NO LONGER AVAILABLE.)