Interview with Dominic Sartorio, Senior Vice President for Products & Development, Protegrity
Corinium
APRIL 25, 2019
Then when there is a breach, it comes as a shock, “wow, I didn’t even know that application had access to so much sensitive data”. Step One in any data security program should first be to discover and classify datasets that are sensitive, and know where that data is, and understand who really needs it to do their jobs.
Let's personalize your content