As the end of 2014 is upon us, I thought it would be good to reflect on some of the challenges we faced this year, and what lies ahead for us in 2015.
From vulnerabilities with names and logos, to breaches and privacy regulation changes around the globe, the complexity of keeping information safe in an always-connected world continued to grow. The necessity for better visibility into endpoint behavior, egress traffic, and document handling gained more traction, and seems to be on a lot of my colleagues' minds for the coming budget year. We’ve seen so many innovative security software products come to life, all which offer next generation behavioral and malware ...