“Enterprises often focus on the network perimeter and follow compliance requirements without really protecting the data, said Subhash Tantry, CEO of FoxT. Assuming the network has already been breached, measures such as fine-grained authorization, policy enforcement and contextual authentication would ensure only the users who are supposed to have access to the information can view the data, he said. Intruders who are lurking in the network would be still locked out.”
The original article can be found here.