Protecting sensitive data is important, however, finding and identifying sensitive data in transit and at rest remains a challenge on large networks. Additionally, there is a limited ability to know precisely what personnel within the organization has ac