Presentation by Beyond on the challenge of actively controlling critical data at the endpoint and IP-protected data security solutions. More info at http://www.information-age.com