> Utimaco > Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco
Utimaco
Published:  Aug 18, 2008
Length:  15 pages

Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.



Tagsleak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security