Stopping data leakage: Exploiting your existing security investment
Stopping data leakage: Exploiting your existing security investment

Stopping data leakage: Exploiting your existing security investment

02:11, November 3 2010

By Sophos

As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support this policy, and describes where new investment should realistically be made.

As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support this policy, and describes where new investment should realistically be made.
As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Download whitepaper

Help us to better improve our communications by entering all or some of the additional fields below, then click 'Download White Paper' to be taken to the next page.


I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box

More White Papers