by tpham211 | May 4, 2010 | White Paper
The Problem Secure environments are at risk from internal threats. The easiest and most pervasive avenue to compromising sensitive information by the internal threat is the availability of data stored on local devices such as hard drives, USB drives, CD/DVDs. The...