One of the problems with insider data leak (IDL) solutions is their complexity: You're always scanning networks, e-mail, and file shares trying to catch sensitive documents before they get into the ...