Usage of Confidential Data-Related Security Measures With respect to securing confidential data, please describe your organization’s usage of each of the following security measures. (Percent of respondents, N=308) Already use Plan to do this within the next 12 months No plans to do this but interested Vendor Remote access gateway No plans to do this 75% Desktop port blocking controls 8% 5% 3% 8% 61% Database monitoring solution 13% 58% Log management analysis/aggregation 51% Formal model for information governance/assurance 49% Compliance management software 47% Multi-factor authentication 47% Financial Don't know 8% 4% 14% 16% Channel 16% 16% 10% 3% 15% 11% 3% 20% 13% 18% 5% 12% 14% 13% 6% 15% 6% 18% 18% Desktop/laptop-based DLP 44% 16% 11% 7% 22% Security Information Management (SIM) solution 44% 14% 13% 6% 23% Enterprise data classification 43% 17% Network-based MediaDLP 42% End User 14% 13% Enterprise Rights Management 41% 15% 13% Enterprise data discovery 38% 0% © 2009 Enterprise Strategy Group 10% 20% 20% 30% 40% 50% Source: ESG Research Report, Protecting Confidential Data Revisited, April 2009. 13% 7% 6% 60% 26% 7% 13% 24% 9% 70% 21% 20% 80% 90% 100%
© Copyright 2026 Paperzz