In a recent study, CA Technologies analyzed several factors to consider in selecting and deploying data protection and management platforms:
1. Identify and protect sensitive data
A strong information protection and control solution ultimately needs to protect many of the potential risk points of the enterprise. Most businesses start with data loss protection and then extend protection to other areas, such as misuse of information. The solution should also address broader regulatory and country-specific legal compliance needs.
2, choose Flexible, customized repair options
This information protection and control solution should not simply provide a passive, late analysis of all suspicious activities, but should be flexible enough to take corrective action on each data violation.
3, identity-based Policy Management is the key
When the technology that the enterprise deploys does not consider identity information, the enterprise should deploy the common rules. It is often not enough for an enterprise to know only the classification of data, because IT administrators need more information to protect and control information, such as who is using the data.
4, accuracy is the key
Regardless of how easy it is to configure a growth, DLP tools that are too simple or have limited policy capabilities will not be able to provide effective data loss protection or data control. The point is that if the information protection and control solution does not perform a comprehensive and accurate analysis, the enterprise will not be able to find and resolve the real problem in many false positives.
5. Modular solutions provide flexibility and familiarity
The Modular platform architecture allows system administrators to determine which control point combinations provide the necessary security for the company. In some cases, you only have to control the desktops and notebooks, and in other cases you will need network control points. Endpoints or client components should be able to provide protection even when disconnected from a central server or from a corporate network.
6. Scalability is key in multiple directions
In general, security involves multiple layers of security control, but for some risks, we need some degree of consolidation. Information protection and control is not another aspect of security, but the next step in the enterprise identity and access management process.
7, identity-based repair process
This study suggests that an optimized repair process should have local visibility controls to control who can view specific policy violations. Viewers must be able to view all relevant information, including complete information, complete files and attachments in the original format, and be able to automatically search for and easily find related events to help with the investigation.
8. Identify an identity based strategy
The report notes that identity management processes and technologies should now integrate this information protection and control solution, as this consolidation will better protect sensitive data through identities and roles. "The relationship between identity and identity and information is dynamic," the report said. ”
9, update the information control
E-Mail is an ideal starting point because many regulations require enterprises to monitor, monitor, and control the messaging environment, from inappropriate internal communications to illegal communications outside the enterprise or country. As the most frequently used electronic application in all enterprises, email is no doubt the easiest place to misuse