A DLP strategy must work across all systems and end-user devices, and should be intelligent, granular, and content aware. Securing the Enterprise today, page 7 from the UBM Tech report sponsored by CA Technology says, Ideally, security, compliance, and vulnerabil-ity management solutions must include full-time monitoring of, and reporting on, all en-terprise systems that hold sensitive data. They should have change detection capabilities and alerts that let organizations catch compliance issues early, as well as advanced real-time analytics that can detect unusual activity that may indicate a breach. Monitoring can ensure that an organization has a forensic record for tracing the root cause of any security breach so it can be addressed. Vulnerability and expo-sure detection and prevention are essential to detecting data breaches early on or, even bet-ter, before they happen.