Data sharing

Internal and external movement of sensitive data is monitored to identify potential insider threats (e.g. email, file transfers, etc.)