Securing sensitive data in outsourced environments
By implementing real-time controls over activity that could put data in jeopardy, such as e-mail attachments to external web mail accounts or saving data to portable storage devices, CIGNA is able to mitigate many of the risks present on laptops, desktops & servers throughout their extended enterprise. Download this case study and learn how a point of use security strategy enables companies to expand information sharing without giving up their oversight and control.
At net-security.bitpipe.com, free registration required.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.