To do truly useful monitoring and analysis of data access requires understanding who the users are and what permissions they have, Summers says, so he expects electronic data discovery tools to begin monitoring policy servers and directory services in the next year. That requires a cohesive strategy for compliance and security, one that requires coordinating [...]
Trending Articles
More Pages to Explore .....