Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another.