Information, by definition, exists to be shared and consumed; hence, data will travel way beyond typical network-centric security defenses. Companies must embrace a new way of thinking to identify and protect sensitive information that could be leaked or disclosed, in a way that renders the information useless to anyone without the rights and credentials to use it. By classifying and encrypting information anywhere it resides, you are, in fact, placing a security perimeter around every single data file, thus allowing it to move around on a laptop, or in transit across the network, on a file sharing site or on a USB key hanging around someones neck.”]

