Dec 07, 2011
With compliance requirements and external threats on the rise, no business can afford to leave its data unprotected, especially at the endpoint. Fortunately, IT leaders understand the risk: Fifty-nine percent of recent IDG survey respondents rate backup and protection of desktop and laptop data as crucial or high priority.
Unfortunately, even though the majority of survey respondents have something in place, many fall short in terms of meeting needs for identification, classification and discovery. As a result, these firms leave themselves in a position of vulnerability - especially those in highly regulated industries.
Even though proper protection consumes time and resources, CIOs cannot deny that endpoint information is a potential liability. The big question is, where does a CIO find a non-intrusive way to protect and classify endpoint data to minimize risk, all while making sense economically?