In the earlier days of protecting organizational data from threats, firewalls, antivirus programs and intrusion detection systems (IDS) were enough. But the rapidly evolving cyber threat landscape has revealed some significant holes in these data exfiltration solutions.