6 Signs SMBs Are Still Getting The Hang Of Data Breach Threats

Choosing Technologies

Among the data protection solutions most frequently purchased by the respondents, 65 percent are primarily focused on firewalls and other perimeter security technologies. Thirty-six percent turn to blacklisting and/or whitelisting tools in order to either identify content with known vulnerabilities or limit access to specific content known to be clean. Meanwhile, a significant portion of IT teams also rely on the enforcement of strict data policies, as was cited by one-third of the respondents.


Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.