There is a dizzying array of products designed to prevent data loss, but enterprises sometimes discover the ones they choose don't quite do the job, Bill Brenner writes. He describes a combination of five technologies that IT security pros say are essential to creating a secure environment for sensitive information.

Full Story:

Related Summaries