Information Security Research Library

Powered by


In part four of this video series, Pete Lindstrom from the Burton Group evaluates various protection technologies and strategies and discusses:

  • Why data loss protection is part of a larger information risk management problem that also encompasses data retention (e-discovery), integrity and other concerns
  • What protection technologies make sense in various security layers - perimeter, identity and access, point-of-use and repositories


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.