Imagine a scenario: In a single day, a disgruntled employee opposed to the practices of your company downloads sensitive or confidential company documents, announces his or her resignation, and tells the inside story to a journalist friend. The revelations become front-page news, and the company's legal and public relations teams spend millions trying to repair the company's tarnished brand. Perhaps they succeed. Perhaps they don't.
This isn't just a hypothetical account, but a reality many organizations have faced. Would your company be able to quickly discover massive downloads from an individual PC, or any other insider activity resulting in compromise and data loss?