This report explores why protecting a company's sensitive data assets, and ensuring that authorized data access is appropriate, are the cornerstones of mitigating enterprise risk. Key take-aways include: - Data security "buys-down" business risk more effectively than core and edge security
- Edge security only looks at inbound traffic and fails to protect authorized data access
- Core security cannot determine if legitimate data access is appropriate
|