Things To Know Online

February 6th, 2013

Posted on February 6th, 2013, 23:46

Over the last few years, there has been substantial increase in the number of data breach incidents. In recent times the leaking of government and corporate data to Wikileaks clearly points out the difficulty in ensuring data protection these days. Though technological advancements have helped organizations to improve business operations, it has also been responsible for facilitating data leakage. For instance, the productivity tools, that improved collaboration and communication at the workplace also created new vectors for data loss. Besides, the consumerization of IT that popularized the concept of Bring Your Own Device (BYOD) also contributed to data loss, as it erased the thin line that existed between personal and business systems. All this has made protection of sensitive information a challenge for business enterprises. However, information being one of organizationís valuable assets, keeping it safe and out of bounds of public domain is definitely very important. Hence, enterprises need to partner with information risk management service providers who can provide a comprehensive data protection framework that works across the data lifecycle.

Typically, enterprises deploy data loss prevention (DLP), information rights management (IRM) technologies to prevent data leakage but its effectiveness is questionable. However, compared to it, the effectiveness of a comprehensive data protection framework that provides a complete offering which includes data classification, data flow analysis, fine-tuning, consequence management and tools like data loss prevention (DLP), information rights management (IRM) is indisputable. Here is a look at the data protection solutions provided by a leading information risk management services company.

Strategy and Design
During this phase, the service provider assesses the clientís data protection needs and develops effective data classification strategy and policy. They analyze the clientís critical data, who owns it, who creates it, how it is used, how it is shared etc. Based on an assessment of risks, the data protection framework is designed to address current and emerging trends like BYOD, Cloud, Mobility, etc.

Control and Integration
The service provider helps to deploy the appropriate security and data protection technologies such as data leakage prevention (DLP), information / digital rights management (IRM), and database access monitoring (DAM) tools. They provide project management and technical implementation skills for effective implementation as per the design criteria.

Sustenance and Optimization
The service provider helps to fine tune and optimize the technology implementation to ensure better alignment with business data movement rules, reduction in false positives, KPI reporting and implementing a strong incident management and consequence management framework for continuous vigilance which is key to building a culture of data protection within the organization.

Thus, by deploying a comprehensive
data protection framework across information lifecycle, enterprises can assess, transform and sustain data protection.

Read more on - mobile security services, identity access management

By Josephmax, in: General