Enterprise Selection Data Security protection platform nine considerations

Source: Internet
Author: User
Keywords Security data security
Tags address based ca technologies control customized data data loss protection data protection

In a recent study, CA Technologies analyzed several factors to consider in selecting and deploying data protection and management platforms:

1. Identify and protect sensitive data

A strong information protection and control solution ultimately needs to protect many of the potential risk points of the enterprise. Most businesses start with data loss protection and then extend protection to other areas, such as misuse of information. The solution should also address broader regulatory and country-specific legal compliance needs.

2, choose Flexible, customized repair options

This information protection and control solution should not simply provide a passive, late analysis of all suspicious activities, but should be flexible enough to take corrective action on each data violation.

3, identity-based Policy Management is the key

When the technology that the enterprise deploys does not consider identity information, the enterprise should deploy the common rules. It is often not enough for an enterprise to know only the classification of data, because IT administrators need more information to protect and control information, such as who is using the data.

4, accuracy is the key

Regardless of how easy it is to configure a growth, DLP tools that are too simple or have limited policy capabilities will not be able to provide effective data loss protection or data control. The point is that if the information protection and control solution does not perform a comprehensive and accurate analysis, the enterprise will not be able to find and resolve the real problem in many false positives.

5. Modular solutions provide flexibility and familiarity

The Modular platform architecture allows system administrators to determine which control point combinations provide the necessary security for the company. In some cases, you only have to control the desktops and notebooks, and in other cases you will need network control points. Endpoints or client components should be able to provide protection even when disconnected from a central server or from a corporate network.

6. Scalability is key in multiple directions

In general, security involves multiple layers of security control, but for some risks, we need some degree of consolidation. Information protection and control is not another aspect of security, but the next step in the enterprise identity and access management process.

7, identity-based repair process

This study suggests that an optimized repair process should have local visibility controls to control who can view specific policy violations. Viewers must be able to view all relevant information, including complete information, complete files and attachments in the original format, and be able to automatically search for and easily find related events to help with the investigation.

8. Identify an identity based strategy

The report notes that identity management processes and technologies should now integrate this information protection and control solution, as this consolidation will better protect sensitive data through identities and roles. "The relationship between identity and identity and information is dynamic," the report said. ”

9, update the information control

E-Mail is an ideal starting point because many regulations require enterprises to monitor, monitor, and control the messaging environment, from inappropriate internal communications to illegal communications outside the enterprise or country. As the most frequently used electronic application in all enterprises, email is no doubt the easiest place to misuse

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.