In today’s dynamic business environment, organizations must collaborate on confidential files internally or share these sensitive files with external parties. Files are consumed on mobile devices, BYOD, stored in personal cloud accounts and on home machines. The perimeters and repositories of the organization are hard to define as lines have blurred. How are you staying in control over your confidential data once it travels out of the protected perimeter?