1. Introduction 2. Standard Windows tooling 3. Largescale software packages 4. Focused commercial tooling 5. Freeware 6. Conclusion 7. Approach with Perdemia’s Permission Analyzer 2. Standard Windows tooling 1. Introduction It is common knowledge that most cases of data theft occur within the organization. No hacks from the outside, but people within the organization who
Articles about Permission Analyzer have been published in several magazines and online news sites, see the article from Mark Gibbs on NetworkWorld, this news item on Processor.com, this great article about the application features, or the Editor’s review on DownloadsCenter saying Permission Analyzer will surprise you with its power and capabilities! Feel free to use
Permission Analyzer 2.0 has been released and we are very much interested in your feedback. Feel free to add comments about the usability, features, findings or any interesting results you have achieved using the application.