Data thieves like to plunder Web servers and laptops, use phishing messages, and podslurp to reach your databases. These repositories hold the identity and financial data about your employees, customers and business partners. Learn how to secure your data repositories using encryption, as well as device and port control tools. Also learn to monitor when and how sensitive data leaves your network and how to fuse security onto the data itself.