Why protecting the perimeter, the network, the device, the servers is not suffient any longer. What if the wrong guy gets access to data? What if the right guy does the wrong things with data? IRM is the name of the game! Check out https://techarbor.com/IRM