Atif,
You mentioned the policy is flagging "any packet for protocol HTTP". With a bandwidth rate of around 50-60Mbps, I would imagine you are simply having a large influx of incidents. This isn't quite as scalable to identify sensitive information as you are simply grabbing ALL HTTP traffic. The processing of this much data, putting incidents in the DB, and making them avaialble in incidents in the GUI, is going to cause your systems to throw these messages.
I would consider turning off this policy, and try to reduce the policy to look for some subset of sensitive content to begin with. Consider using one of the built in policies or templates avaialble to start with to see what type of data is seen. Once you get a feel for what the data you see is, you can start to prune down the policies to find specifically what you need. The other approach many customers use it to talk to the business units to identify what the sensitive data they want to block is and start building policies around this. Unfortunately most organizations can't scale to look at ALL HTTP transmissions for sensitive data.