Data is flowing everywhere in multiple formats on multiple devices replicated, backed up, modified, and stolen. Data takes on a life of its own sometimes becoming the source for a brand new structured database. This occurs many times without data validation and verification of its authenticity and accuracy. Technology companies are devising and selling software that crawls the local area network based upon pre-defined policies searching for sensitive information. The problem with this method is that it does not get to the heart of the issues at hand.”]

