Once you've identified what those bits are, you can choose what solution gives you the biggest carpet covering over the area. |
There are some solutions that bridge a couple of the different areas, such as laptop encryption and e-mail. But as far as persistent encryption across the network - not right now. |