Report - through Security Planning - Boston Universityo Patch Management o Database Activity Monitoring o Employ DLP to find and monitor PII oActive DLP oPassive DLP o Endpoint encryption oHard

Please pass captcha verification before submit form