Access control, Antivirus, Antivirus software, Application security, Auditing, Authentication, Biometrics, Current threats, cybersecurity, Digital certificates, Encryption, Endpoint security, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information risk management, Information security, Intrusion management, ISA Server, malware, McAfee, Password, Password management, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security in 2010, Security management, Security products, Security Program Management, Security tokens, SFTP, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
Hi, I am currently putting together an options paper for my employer. Does anyone have or could refer me to a concise list of Business and Technical requirements for a DLP solution? Additionally, if anyone has performed a risk assessment prior to deploying a DLP solution, I'd be grateful for...
What are your organization's preferred methods of data loss prevention? Do you utilize one or a combination of tools?