Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
2009 Bossie Slideshows: Best open source developer toolsBest open source enterprise softwareBest open source networking softwareBest open source platforms and middleware
Read the full report: Best of Open Source Software Awards 2009
Read about the all-time Bossies:The greatest open source software of all timeTop 10 Open Source Hall of Famers
Find out what will be news for the day, with our first-thing-in-the-morning briefing.