Detection and Defense are not enough. Protection against identity data theft, it can be argued is the majority mission of most security products. Whether the products focus on protecting the endpoint, the network, the database or the application – save concerns around availability and integrity – defense against data exfiltration or abuse ranks high among every CISO’s end concern when they buy a security tool.