November 24, 2015

The Problem

Secure environments are at risk from internal threats.  The easiest and most pervasive avenue to compromising sensitive information by the internal threat is the availability of data stored on local devices such as hard drives, USB drives, CD/DVDs.  The internal threat can download data to the local device, conceal it and remove it from the facility with ease. (more…)